Stars
The Swiss Army knife for automated Web Application Testing
This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs from the REMnux package repository on Launchpad.
OS image for the PiRogue based on Debian 12
Silent SMS ping and detector
Cameradar hacks its way into RTSP videosurveillance cameras
Rust tool to detect cell site simulators on an orbic mobile hotspot
w3af: web application attack and audit framework, the open source web vulnerability scanner.
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
Exploitation Framework for Embedded Devices
Accurately Locate Smartphones using Social Engineering
Manipulate Chromecast Devices in your Network
Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is available in this repo
QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.
Official payload library for the O.MG line of products from Mischief Gadgets
A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks
This is a multi-use bash script for Linux systems to audit wireless networks.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…
Source of the project website
This is the development tree. Production downloads are at:
Exela Stealer is an undetectable stealer software at both runtime and scan time. It operates asynchronously, ensuring complete stealth (FUD). It steals passwords, cookies, autofill data, sessions, …
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…