arp-poison (aka arp spoof) tool
-
Updated
Apr 9, 2013 - C
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
arp-poison (aka arp spoof) tool
A Man-In-The-Middle tool, not using ARP responses, but stealing the port of the switch of the victim, changing its association in the CAM table.
In this hacking scenario, students on 2 teams defend and attack a vulnerable server, database, and website.
Memory dumper for 3DS handheld
Replace the RF remote controls car by an Android app and bluetooth transceiver
backdoor-ggoboogy created by GitHub Classroom
SecurityTube Linux Assembly Expert (SLAE) repository.
CatchME - WiFi Fun Box "Having Fun with ESP8266"
This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.md. Enjoy!
A modular pentesting framework implemented in C