Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014
☆24Feb 12, 2018Updated 8 years ago
Alternatives and similar repositories for BH-USA-2014
Users that are interested in BH-USA-2014 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- I2P monitor and control application for Mac OS X☆11Jul 10, 2016Updated 9 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Read .nfo files using bash. Optimized for OS X.☆24Jul 5, 2014Updated 11 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Official QEMU mirror☆30Aug 19, 2025Updated 7 months ago
- Slides for eMMC Hacking 2017☆16Apr 27, 2018Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Tool for deploying standalone Linux applications☆15Aug 21, 2019Updated 6 years ago
- Function hook, code injection, monitoring☆14Jul 12, 2018Updated 7 years ago
- ☆11May 9, 2024Updated last year
- ☆12Dec 26, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The U-SIMonitor is an application for Android that performs AT-commands to the baseband modem of mobile phones. It can obtain the securit…☆16Feb 28, 2015Updated 11 years ago
- A multi service threaded MD5 cracker☆66Jul 15, 2016Updated 9 years ago
- Genode OS Framework☆17Mar 18, 2026Updated last week
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- crc patcher for kernel modules☆12Apr 15, 2016Updated 9 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- reversing mtk-su☆17Mar 4, 2020Updated 6 years ago
- Official Intel SOCFPGA Arm-TF repository. Note: (1) A "RC" labeled branch is for internal active development use and customer early acces…☆18Feb 28, 2026Updated 3 weeks ago
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- example.on('end', mustCall(() => {})); Check the callback function is called.☆10Nov 20, 2022Updated 3 years ago
- ☆16Aug 31, 2012Updated 13 years ago
- EDL mode downloaded for Samsung A505FN based on smdk-tools-v0.20☆20Jun 16, 2020Updated 5 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- An android application which exploits sieve through android components.☆44Sep 17, 2017Updated 8 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- frameworks_base for Geeksphone Peak and Keon☆12Jan 13, 2015Updated 11 years ago
- ☆19Mar 30, 2021Updated 4 years ago
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago