Lyrebirds / sagemcom-fast-3890-exploit
☆221Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit:
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
- ☆291Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆624Updated 4 years ago
- A simple embedded Linux backdoor.☆198Updated 4 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 6 months ago
- ☆167Updated 5 years ago
- Analysis of public exploits or my 1day exploits☆617Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 7 years ago
- macOS Kernel Exploit for CVE-2019-8781.☆290Updated 5 years ago
- ☆525Updated 5 years ago
- NTP Main-in-the-Middle tool☆244Updated 3 years ago
- ☆105Updated 3 years ago
- A PowerShell example of the Windows zero day priv esc☆326Updated 6 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆101Updated 2 years ago
- ☆194Updated 4 years ago
- ☆142Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- ☆104Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆161Updated 5 years ago
- ☆228Updated 2 years ago
- ☆102Updated 5 years ago