Lyrebirds / sagemcom-fast-3890-exploitLinks
☆222Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆159Updated 4 years ago
- ☆196Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆219Updated 5 years ago
- ☆293Updated 4 years ago
- ☆129Updated 6 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- ☆104Updated 3 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆177Updated 8 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- Private keys that have become public ...☆183Updated last month
- ☆383Updated 13 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆105Updated 2 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS☆196Updated 5 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆176Updated 7 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 12 years ago
- ☆231Updated 2 years ago
- ☆166Updated 6 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- collection of verified Linux kernel exploits☆189Updated 4 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated last month
- Android AT command scripts and firmware extraction☆343Updated 5 years ago
- File transfer via DNS☆73Updated 8 years ago
- ☆145Updated 9 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago