Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"
☆31Oct 26, 2019Updated 6 years ago
Alternatives and similar repositories for HardwareHackingForTheMasses
Users that are interested in HardwareHackingForTheMasses are comparing it to the libraries listed below
Sorting:
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- A command-line tool for interfacing msr devices.☆12Nov 25, 2020Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- ☆13Jul 22, 2017Updated 8 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- ☆18Dec 4, 2018Updated 7 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- Unix Based Command☆18Jan 13, 2026Updated last month
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploi…☆17Dec 8, 2015Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- Auto discover and exploit LAN raspberry pi's☆109Apr 7, 2024Updated last year
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- ☆48Dec 23, 2020Updated 5 years ago
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.☆47Feb 15, 2020Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- CVE-2019-16097 PoC☆23Sep 19, 2019Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Jul 24, 2019Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆215Oct 7, 2019Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- ☆28Jan 3, 2021Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- ☆127Jun 19, 2020Updated 5 years ago