SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP
☆15Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for SigPloit
Users that are interested in SigPloit are comparing it to the libraries listed below
Sorting:
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- ☆296Feb 8, 2022Updated 4 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 8 months ago
- Meteor package for client + server side IMSI-catcher detection.☆21Jun 9, 2016Updated 9 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teaching☆16Mar 4, 2018Updated 8 years ago
- An android app that sends phone location details via sms and to the web. A hack for MFA mobile workshop☆14Jul 24, 2009Updated 16 years ago
- lzma-uncramfs is a modification of the uncramfs program to be able to unpack cramfs images included in some openrg based home routers. It…☆12Jul 20, 2021Updated 4 years ago
- This library provides a simple API client function for DeepL☆15Aug 12, 2020Updated 5 years ago
- SPAM SMS Unlimited☆19Jul 18, 2018Updated 7 years ago
- Osmocom Gateway GPRS Support Node; Mirror of https://gitea.osmocom.org/cellular-infrastructure/osmo-ggsn☆25Dec 3, 2025Updated 3 months ago
- Health Analytics Data-to-Evidence Suite (HADES): A collection of R packages for performing analytics against the Common Data Model.☆27Mar 6, 2026Updated 2 weeks ago
- code editor in console.☆15Jan 10, 2017Updated 9 years ago
- ☆27Feb 2, 2026Updated last month
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Android Hacking Over Wan☆23Dec 23, 2019Updated 6 years ago
- Fractional FFT implementation in python.☆16Sep 22, 2017Updated 8 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Scripts and code example about penetration testing, web, network and exploiting wireless devices.☆11Jun 24, 2018Updated 7 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- Litmus is a comprehensive LLM testing and evaluation tool designed for GenAI Application Development. It provides a robust platform with …☆46Feb 20, 2026Updated last month
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated last week
- Linux kernel for Cisco/Linksys Candyhouse routers☆17Sep 4, 2015Updated 10 years ago
- python, ccxt, backtrader, dash☆10Apr 20, 2018Updated 7 years ago
- Postman collection to interact with the Shodan API☆25Nov 8, 2023Updated 2 years ago
- ☆25Oct 9, 2017Updated 8 years ago
- Getting Linux on the RCA Cambio☆26May 17, 2024Updated last year
- Reinforced Mitigation Security Filter☆15Sep 26, 2021Updated 4 years ago
- ☆34May 11, 2021Updated 4 years ago
- Source code for the backend of ocwcentral.com☆18May 5, 2024Updated last year
- A powerful prompt template engine built upon Jinja☆12Oct 22, 2025Updated 4 months ago
- Return all awailable streams from m3u8 playlist☆13Sep 4, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- API gateway and reverse proxy for OpenAI APIs☆15Jul 27, 2023Updated 2 years ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Updated this week
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Allows external systems or MCUs to connect BLE (CC2540) using HCI as BLE Central Role☆11Jul 1, 2015Updated 10 years ago
- A proxy for Google Bard LLM☆10Nov 2, 2023Updated 2 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago