İsmail Mert AY AK's repositories
pysim
A python tool to program SIMs / USIMs / ISIMs. Mirror of https://gitea.osmocom.org/sim-card/pysim
osmocom-bb
Mobile Statuion side GSM implementation; mirrored from https://gitea.osmocom.org/phone-side/osmocom-bb
srsRAN_4G
Open source SDR 4G software suite from Software Radio Systems (SRS) https://docs.srsran.com/projects/4g
LTESniffer
An Open-source LTE Downlink/Uplink Eavesdropper
gr-osmosdr
Mirrored from https://gitea.osmocom.org/sdr/gr-osmosdr
gr-gsm
Gnuradio blocks and tools for receiving GSM transmissions
IMSI-catcher
This program show you IMSI numbers of cellphones around you.
viproy-voipkit
VIPROY - VoIP Pen-Test Kit for Metasploit Framework
srsLTE-Sniffer
Stuff for srsLTE IMSI catcher
Mr.SIP
SIP-Based Audit and Attack Tool
falcon
FALCON - Fast Analysis of LTE Control channels
FuzzyModbus
ModbusTCP Fuzzing and DoS Tool.
ReverseTCPShell
PowerShell ReverseTCP Shell - Framework
Kamerka-GUI
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.
ss7MAPer
SS7 MAP (pen-)testing toolkit
awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻
diafuzzer
Diameter interfaces fuzzer. Its fuzzing process is based on concrete network traces, and it uses 3gpp and ETSI specifications to fuzz efficiently.
rustbuster
DirBuster for Rust
attack-to-elk
This program exports MITRE ATT&CK framework in ELK dashboard
LTE-Cell-Scanner
LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure)
ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
awesome-industrial-control-system-security
A curated list of resources related to Industrial Control System (ICS) security.
isf
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
iec104
IEC104 Client for Metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
fluxion
Offical repo for fluxion
sqliv
massive SQL injection vulnerability scanner
pentest
My Diary of Pentesting Adventure
angryFuzzer
Tools for information gathering