LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
-
Updated
Sep 20, 2023 - C
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
An offline Wi-Fi Protected Setup brute-force utility
ParadoxiaRat : Native Windows Remote access Tool.
A Linux packet crafting tool.
Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Reverse Engineering tools
Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
A USB-based script for Ethical hacking with multiple attacks
Brute force attack against WPS, that actually works
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
arp-poison (aka arp spoof) tool
A rebranded version of our old, beloved Osintgram Client
DNS amplification tool. A type of DDoS attack in which attackers use publicly accessible open DNS servers to flood a target with DNS response traffic. An attacker sends a DNS lookup request to an open DNS server with the source address spoofed to be the target’s address. When the DNS server sends the record response, it is sent to the target ins…
Add a description, image, and links to the hacking-tool topic page so that developers can more easily learn about it.
To associate your repository with the hacking-tool topic, visit your repo's landing page and select "manage topics."