Lyrebirds / sagemcom-fast-3890-exploitLinks
☆221Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
Sorting:
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆261Updated last year
- ☆292Updated 4 years ago
- ☆127Updated 6 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- ☆381Updated 12 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- ☆196Updated 4 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- NTP Main-in-the-Middle tool☆246Updated 3 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 7 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 2 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- ☆230Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 9 months ago
- Toolbox for HPE iLO4 & iLO5 analysis☆427Updated last year
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆182Updated 3 years ago
- A ZigBee hacking toolkit by Bishop Fox☆280Updated 3 years ago
- Private keys that have become public ...☆178Updated 3 months ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- ☆143Updated 8 years ago
- ☆166Updated 6 years ago
- ☆62Updated 3 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆290Updated last year
- ☆104Updated 3 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago