Decrypt encrypted SonicOSX firmware images
☆20Feb 24, 2025Updated last year
Alternatives and similar repositories for sonicrack
Users that are interested in sonicrack are comparing it to the libraries listed below
Sorting:
- ☆16Dec 7, 2025Updated 2 months ago
- ☆17Jan 9, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆21Jan 8, 2026Updated last month
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- ☆31Dec 5, 2024Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆13Sep 5, 2024Updated last year
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆42Jan 6, 2026Updated last month
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆41Jul 11, 2024Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- ☆21Apr 30, 2025Updated 10 months ago
- ☆24Oct 18, 2022Updated 3 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 3 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 6 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- ☆24Jun 9, 2024Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆22Apr 28, 2025Updated 10 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year