Nhoya / MycroftAI-RCE
"Zero Click" Remote Code Execution in Mycroft AI vocal assistant
☆53Updated 6 years ago
Alternatives and similar repositories for MycroftAI-RCE:
Users that are interested in MycroftAI-RCE are comparing it to the libraries listed below
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆56Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆21Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- ☆13Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆27Updated 9 years ago
- This is a concept poc of command and control server implemented over blockchain☆47Updated 5 years ago
- My public exploit collection.☆32Updated 6 years ago
- Shock the shell! Exploit many injection method for shellshock☆17Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆33Updated 5 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- PDF report generator for basic recon☆9Updated 6 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago