Mitrastar MIPS router analysis and exploitation
☆20Jul 25, 2021Updated 4 years ago
Alternatives and similar repositories for mistrastar-mips-exploit
Users that are interested in mistrastar-mips-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC☆13Jun 1, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆41Dec 5, 2025Updated 4 months ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆82Aug 3, 2025Updated 8 months ago
- A wrapper library for the set of ptrace-related system calls in Linux☆13May 20, 2014Updated 11 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- legacy MTK devices preLoader from Mediatek☆22Apr 29, 2024Updated last year
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Aug 27, 2014Updated 11 years ago
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- General Use Timeseries Containers for Rust☆11Dec 31, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Binary exploitation CTF challenge☆24Nov 27, 2018Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆87Apr 1, 2026Updated 2 weeks ago
- XSS payloads to bypass various XSS filters☆14May 1, 2019Updated 6 years ago
- This is a repository for collecting and collating vulnerability disclosures, tips, and tools☆17Nov 19, 2025Updated 4 months ago
- Passive network mapping tool written in Ruby☆15Apr 8, 2014Updated 12 years ago
- Arduino Library for The Things Node☆22Sep 24, 2020Updated 5 years ago
- ☆15Jul 30, 2024Updated last year
- Analyze data from Mi Band Mi Fit (Xiaomi) with jupiter notebook☆11Oct 6, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- collection of pentesting and network security documents☆21Jun 1, 2022Updated 3 years ago
- cpauto is a client library, written in Python, for the web APIs exposed via Check Point R80 management server software. The Check Point R…☆17Oct 21, 2021Updated 4 years ago
- BluetoothHook - 向 Android 系统蓝牙扫描结果中注入虚拟 BLE 设备☆46Dec 22, 2025Updated 3 months ago
- Easy installers for Maru OS.☆13May 19, 2019Updated 6 years ago
- Patching AmsiOpenSession by forcing an error branching☆154Aug 2, 2023Updated 2 years ago
- A simple python package to stretch audio files and change their speed☆12Feb 18, 2026Updated last month
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- ☆12Apr 5, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆14Feb 25, 2022Updated 4 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- APKnife is an advanced APK analysis and modification tool designed for security researchers and ethical hackers. It allows users to extra…☆16Mar 13, 2025Updated last year
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- Programmatic Electron fuse detection☆21Jul 2, 2024Updated last year
- Samsung Galaxy A52s (a52sxq) TWRP Device Tree.☆12Oct 21, 2024Updated last year