Huawei-LTE-routers-mods / imei_generatorLinks
IMEI generator used in Huawei modified firmware
☆12Updated 3 years ago
Alternatives and similar repositories for imei_generator
Users that are interested in imei_generator are comparing it to the libraries listed below
Sorting:
- yara-python-dex enabled wheels☆11Updated 2 months ago
- Dwarf script to collect network requests and display on data panel☆21Updated 5 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Updated 5 years ago
- A smali emulator.☆25Updated 7 years ago
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆32Updated 6 months ago
- ☆19Updated 6 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Tracing and parsing an executing binary file☆29Updated 10 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆102Updated 8 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- ☆48Updated 7 years ago
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12Updated 9 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- Feitian Rockey4ND dongle testing☆32Updated 3 years ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Updated 2 months ago
- Solutions to crackmes☆19Updated 10 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Qualcomm baseband hacking stuff☆55Updated 5 years ago
- ☆96Updated 5 years ago
- Result of the Android security research☆17Updated 8 years ago
- Simple AutoIt crypter.☆11Updated 8 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 5 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- JEB Scripts☆21Updated 10 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 8 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 6 years ago