Tuesday, December 10, 2019
Home Tags Devices

Tag: devices

bluelog

Bluelog

Must Need

Buster : Find Emails Of A Person And Return Information Associated With Them

Buster : Find Emails Of A Person And Return Information Associated...

Buster is a tool to find emails of a person and return info associated with them. It is a simple OSINT tool...
Android Application

The Android Application Developer Guide: Converting an iOS App to Android

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many will do the change...
4CAN : Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

4CAN : Open Source Security Tool to Find Security Vulnerabilities in...

4CAN is an open source security tool to find security vulnerabilities in modern cars. Tested on the following raspbian images using...
Network Attacker

Network Attacker : WiFi Stress Testing Beacon Flooding & De-authentication Attack

Network Attacker V0.1 is a Wifi Stress Testing Bash Script Program Based on Mdk3 Beacon Flooding & Deauthentication Attack.  This was created to help...
Virtuailor : IDAPython Tool For Creating Automatic C++ Virtual Tables In IDA Pro

Virtuailor : IDAPython Tool For Creating Automatic C++ Virtual Tables In...

Virtuailor is an IDAPython tool that reconstructs vtables for C++ code written for intel architecture, both 32bit and 64bit code and AArch64...
RootOS

RootOS – macOS Root Helper

rootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL...
FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...