Lyrebirds / sagemcom-fast-3890-exploitLinks
☆222Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
Sorting:
- ☆292Updated 3 years ago
- Database of private SSL/SSH keys for embedded devices☆261Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆162Updated 2 years ago
- ☆229Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 7 months ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆221Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆165Updated 6 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆112Updated 6 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Private keys that have become public ...☆175Updated last month
- An Android app that lets you use your access control card cloning devices in the field.☆461Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- ☆143Updated 8 years ago
- Evil client portion of EAP relay attack☆202Updated last year
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆103Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- PoC || GTFO Issues☆68Updated 5 years ago
- Qt Port for Linux, Mac OSX and Windows☆299Updated 2 years ago
- ☆104Updated 3 years ago
- Toolbox for HPE iLO4 & iLO5 analysis☆425Updated last year