Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series
MIT License
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Exploit Development, Reverse Engineering & Cryptography
Automatic SSRF fuzzer and exploitation tool
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
Inject code and spy on wifi users
Easy Exploit Hosting
P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Ras...
Easily Flash Marauder onto the Flipper Zero Devboard or an ESP32!
The Offensive Manual Web Application Penetration Testing Framework.
Exploitation Framework for Embedded Devices
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool c...