Pinned Repositories
5g-attacks
5G-UE-SecurityTesting
5GBaseChecker
5ghoul-5g-nr-attacks
Above
Invisible network protocol sniffer
aegis
Automatic Exploitation Generator created with binaryninja, ROPgadget, pwntools, and angr
airbnb-sdk
A Typescript wrapper around the Airbnb API (unofficial).
aka_bypass
Implementing an LTE AKA bypass attack based on srsRAN
AutoHotspot-Installer
For the RaspberryPi computers. Allows switching between a Raspberry Pi Access Point and Wifi Network connection without a reboot.
bzxxxxxx's Repositories
bzxxxxxx/5GBaseChecker
bzxxxxxx/aegis
Automatic Exploitation Generator created with binaryninja, ROPgadget, pwntools, and angr
bzxxxxxx/automatisch
The open source Zapier alternative. Build workflow automation without spending time and money.
bzxxxxxx/Booking-App
Full stack web site like Booking.com website using MERN stack including reservation, leveraging Context API, JWT authentication, custom hooks, and a dynamic React calendar.
bzxxxxxx/bsqli
Fast and customizable Blind SQL vulnerability scanner based on simple xor payloads.
bzxxxxxx/Carrion
Reject calls failing STIR/SHAKEN
bzxxxxxx/CellGuard
CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled
bzxxxxxx/counter-exploit-toolkit
bzxxxxxx/CVE-2024-21378
PoC Exploit for Outlook Vulnerability, CVE-2024-21378
bzxxxxxx/CVE-2024-26229-exploit
Windows LPE
bzxxxxxx/CVE-2024-38077-POC
bzxxxxxx/DeadPotato
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
bzxxxxxx/EIGRPWN
Some scripts for EIGRP attacks
bzxxxxxx/eris
A powerful investigation tool designed to securely collect, parse, and monitor social media data across platforms such as Facebook, Instagram, Twitter, WhatsApp, and Telegram. Utilizing OAuth for authentication and APIs/web scraping techniques, it retrieves posts, messages, and metadata, with real-time flagging of suspicious activities.
bzxxxxxx/frida-flutterproxy
Burp proxy flutter apps
bzxxxxxx/google-maps-scraper
scrape data data from Google Maps. Extracts data such as the name, address, phone number, website URL, rating, reviews number, latitude and longitude, reviews,email and more for each place
bzxxxxxx/hatchet
MongoDB JSON Log Analyzer
bzxxxxxx/HttpRemotingObjRefLeak
Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting
bzxxxxxx/JS-Tap
JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application.
bzxxxxxx/KeyEcho
Make your typing more enjoyable - Each keystroke echoes a pleasant sound.
bzxxxxxx/MMSF
Massive Mobile Security Framework
bzxxxxxx/moukthar
Android remote administration tool
bzxxxxxx/pdf-exploit
POC Pdf-exploit builder on C#
bzxxxxxx/sccmhunter
bzxxxxxx/semgrep
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
bzxxxxxx/Simons-HID-Scripts
A collection of scripts made for different HID injection platforms used to pwn computers.
bzxxxxxx/simurai
bzxxxxxx/SoniTranslate
Synchronized Translation for Videos. Video dubbing
bzxxxxxx/stf
Control and manage Android devices from your browser.
bzxxxxxx/V2GEvil
V2G evaluation tool