Lyrebirds / sagemcom-fast-3890-exploitLinks
☆222Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
Sorting:
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆266Updated last year
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- ☆231Updated 2 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆174Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆159Updated 4 years ago
- Private keys that have become public ...☆183Updated last week
- ☆293Updated 4 years ago
- ☆129Updated 6 years ago
- ☆196Updated 4 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆186Updated 3 years ago
- a collection of writeups and tools related to ~embedded device ~hacking☆143Updated 7 years ago
- A ZigBee hacking toolkit by Bishop Fox☆286Updated 4 years ago
- ☆104Updated 3 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆224Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- ☆166Updated 6 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS☆196Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 3 weeks ago
- ☆145Updated 9 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago