Hack a Drone
☆19Feb 6, 2018Updated 8 years ago
Alternatives and similar repositories for hack-a-drone
Users that are interested in hack-a-drone are comparing it to the libraries listed below
Sorting:
- Creates statically linked python 3/2 with cross compilation☆11Jan 18, 2025Updated last year
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- ☆13Nov 10, 2020Updated 5 years ago
- Parsing, modifying and using DUML packets☆14Nov 24, 2025Updated 3 months ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- Sample Terraform code for a dynamic cloud-init file on vSphere☆16Jan 8, 2020Updated 6 years ago
- SharedVault is a small application that allows you to define a secret that will require multiple people to unlock.☆13Apr 29, 2021Updated 4 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- ☆15Apr 8, 2023Updated 2 years ago
- Terraform Module Template☆16Apr 29, 2022Updated 3 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- Sample code for the NetCloud Manager API☆26Updated this week
- kernel dump helpers☆26Jan 29, 2026Updated last month
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- tui for Mac to interact with bluetooth devices via blueutil☆48Aug 17, 2025Updated 6 months ago
- ☆29Jan 31, 2025Updated last year
- An IDAPython script to decompile all the functions of an executable and dump the pseudocode☆31Sep 13, 2022Updated 3 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆34Oct 30, 2025Updated 4 months ago
- Fast, resilient and reproducible data analysis with cached SQL queries☆30Aug 3, 2023Updated 2 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆36Feb 11, 2024Updated 2 years ago
- BDF is a Python tool designed to spin-up pseudo random vulnerable Android applications for training when it comes to vulnerability resear…☆47Apr 14, 2024Updated last year
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- A simple Python 3.5+ multitasking library.☆35Jan 18, 2020Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- A client-server chat app in Python☆40May 3, 2023Updated 2 years ago
- ADB Based Acquisition Tool for Android Forensics☆43Mar 30, 2021Updated 4 years ago
- Python program to write new Python programs☆39Feb 16, 2026Updated 2 weeks ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Nov 17, 2017Updated 8 years ago
- Python module for OpenPGP written in Rust.☆53Feb 5, 2026Updated last month
- ☆64Mar 29, 2022Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago