Decrypt encrypted SonicOSX firmware images
☆21Feb 24, 2025Updated last year
Alternatives and similar repositories for sonicrack
Users that are interested in sonicrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Dec 7, 2025Updated 5 months ago
- ☆16Jan 9, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- ☆15Sep 5, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Execute shellcode via Bluetooth device authentication☆42Feb 19, 2025Updated last year
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated 2 years ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- ☆32Dec 5, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 9 months ago
- DbgFlashVul☆10Sep 8, 2015Updated 10 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- ida pro collapse plugin☆30Jul 26, 2023Updated 2 years ago
- ☆28Jan 10, 2024Updated 2 years ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆44Jan 6, 2026Updated 4 months ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- ☆24Oct 18, 2022Updated 3 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆32May 23, 2025Updated last year
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- ☆20Jan 8, 2026Updated 4 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- ☆29Mar 21, 2026Updated 2 months ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Find what egress ports are allowed☆47Nov 19, 2025Updated 6 months ago
- Dynamips-GDB-Mod is a patch to the Dynamips Cisco IOS emulator which facilitates debugging and reverse engineering process of Cisco IOS.☆33Mar 13, 2013Updated 13 years ago
- Shellcode reflective DLL injection in Rust☆30May 3, 2026Updated 2 weeks ago
- A simple web viewer for TruffleHog JSON output.☆20Jan 7, 2026Updated 4 months ago
- Research browsers☆52Apr 12, 2026Updated last month
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆98Aug 23, 2025Updated 9 months ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆34Jun 16, 2024Updated last year