The ChromeCast Exploitation Kit
☆37Sep 2, 2023Updated 2 years ago
Alternatives and similar repositories for CCEK
Users that are interested in CCEK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- Code snippets for exploring malware techniques in C.☆16May 27, 2023Updated 2 years ago
- Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr☆17Mar 23, 2022Updated 4 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- Having fun with the Jawbone UP2 band☆13Jul 21, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Python 3 driver and integrated PyGame point cloud viewer for RPLIDAR sensors☆17Sep 26, 2019Updated 6 years ago
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆27Sep 6, 2025Updated 7 months ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- The U-SIMonitor is an application for Android that performs AT-commands to the baseband modem of mobile phones. It can obtain the securit…☆16Feb 28, 2015Updated 11 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- synced is a user space Synchronous Ethernet (Sync-E) stack for the Linux operating system. synced facilitates Sync-E, according to the IT…☆11Feb 5, 2025Updated last year
- search ip cam on network☆21Aug 3, 2016Updated 9 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Projection mapping examples in Processing☆21Jul 13, 2012Updated 13 years ago
- Discontinued. Please go to https://github.com/RMerl/asuswrt-merlin . Custom firmware for Asus RT-N66U based on asus sources. Started by E…☆19Mar 8, 2020Updated 6 years ago
- NAT Pinning exploit tool for penetration testers.☆34Jan 20, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- Follow the Lights boot sector game in only 510 bytes of x86 machine code.☆14Mar 9, 2020Updated 6 years ago
- A collection of awesome things regarding M5Stack ecosystem☆11Sep 22, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- testing123☆14Nov 23, 2024Updated last year
- Linux driver for Realtek 802.11ac☆12May 13, 2017Updated 8 years ago
- Open Source Intelligence Tools, Writeups, Web Reconnaissance, Toolkits, Other Awesome Represotries and More☆15Apr 28, 2020Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Some papers and exploit writeups about WebKit.☆21Feb 18, 2024Updated 2 years ago
- Scripts and templates related to Ethernet OAM☆10Mar 15, 2017Updated 9 years ago