zadewg / GS-LOCLinks
Apple geolocation services reverse engineering. Database scraper.
☆65Updated 2 years ago
Alternatives and similar repositories for GS-LOC
Users that are interested in GS-LOC are comparing it to the libraries listed below
Sorting:
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆117Updated 7 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- Get clients and access points.☆48Updated 6 years ago
- A docker container for running the hashcat brain server☆25Updated 6 years ago
- Global key for HID iCLASS☆41Updated 9 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆106Updated 9 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆177Updated 9 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- ☆47Updated 6 years ago
- ☆21Updated 4 years ago
- UPnP hacking scripts and tools☆77Updated 9 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- macOS Privilege Escalation Helper☆142Updated 11 months ago
- Password Breach API Server☆88Updated 6 months ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆153Updated 6 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Updated 5 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS☆196Updated 6 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 8 years ago
- Selective wifi jammer - control who can connect where☆48Updated 8 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- Hardware backdoor for CAN bus.☆48Updated 7 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆202Updated 3 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago