Naik (naiksrinu)

naiksrinu

Geek Repo

Location:Germany

Github PK Tool:Github PK Tool

Naik's repositories

UAV_DataSet_NetworkCommunication

UAV Network Communication Experimental dataset is a collection of network traffic captured from a wireless network used by unmanned aerial vehicles (UAVs) during a simulated search and rescue mission. The dataset includes both legitimate network traffic and traffic generated by WiFi and GPS attacks.

Language:PythonStargazers:9Issues:1Issues:0

IoTSecurity

IoT Security for Industries

Language:PythonStargazers:5Issues:2Issues:0

smartpcapreplay_v1.0

Replay the PCAPS with Sessions using Single Machine

Language:PythonStargazers:5Issues:2Issues:0

arm_shellcode

Make ARM Shellcode Great Again

Language:AssemblyStargazers:0Issues:2Issues:0

b618reboot

Simple Python script for rebooting Huawei B618 LTE router

Language:PythonLicense:MITStargazers:0Issues:2Issues:0
Language:PythonStargazers:0Issues:0Issues:0

blue_eye

Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses and much more ..! Author: Jolanda de Koff

Language:PythonLicense:GPL-3.0Stargazers:0Issues:1Issues:0
Stargazers:0Issues:2Issues:0

Exploit-Challenges

A collection of vulnerable ARM binaries for practicing exploit development

Language:CStargazers:0Issues:0Issues:0

exploitdb

The official Exploit Database repository

Language:CLicense:GPL-2.0Stargazers:0Issues:2Issues:0

fingerprint_IOT_OS

Understand the target OS based on TTL Value

Language:PythonStargazers:0Issues:0Issues:0

google_dork_list

Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of around 10,000 Dorks. Author: Jolanda de Koff

Stargazers:0Issues:0Issues:0

labs

Vulnerability Labs for security analysis

Language:PythonStargazers:0Issues:0Issues:0

Learnings

A placeholder to drop my learnings on Web/Network/Mobile Research & Further Exploitation.

Language:PythonStargazers:0Issues:1Issues:0

linux-exploitation-course

A Course on Intermediate Level Linux Exploitation

Language:PythonLicense:CC-BY-4.0Stargazers:0Issues:0Issues:0

obts

OpenBTS 5.0 + Testcall

Language:RoffLicense:AGPL-3.0Stargazers:0Issues:0Issues:0

pacemaker

Heartbleed (CVE-2014-0160) client exploit

Language:PythonLicense:MITStargazers:0Issues:2Issues:0

pentesting-cookbook

A set of recipes useful in fast-paced pentesting / red teaming scenarios

Stargazers:0Issues:1Issues:0

pydemo.github.io

Python Demo - impress.js

Stargazers:0Issues:0Issues:0

pyltes

Python LTE Simulator

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

routersploit

Exploitation Framework for Embedded Devices

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Language:PHPLicense:MITStargazers:0Issues:2Issues:0

static-arm-bins

Statically compiled ARM binaries for debugging and runtime analysis

Language:CLicense:WTFPLStargazers:0Issues:0Issues:0

tactical-exploitation

Modern tactical exploitation toolkit.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

uav-xai-simulation

Explainable UAV simulation

License:BSD-2-ClauseStargazers:0Issues:0Issues:0