The ChromeCast Exploitation Kit
☆37Sep 2, 2023Updated 2 years ago
Alternatives and similar repositories for CCEK
Users that are interested in CCEK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- Code snippets for exploring malware techniques in C.☆16May 27, 2023Updated 2 years ago
- Simplified version of flashrom for installing new system firmware☆23Mar 10, 2023Updated 3 years ago
- Next-generation Digital Lighting Workstation☆20Nov 19, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 11 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- Python 3 driver and integrated PyGame point cloud viewer for RPLIDAR sensors☆17Sep 26, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- Proactive Remediation script: Update Lenovo BIOS to the latest version directly from Lenovo website☆14Mar 17, 2025Updated last year
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Particle Photon based 12v car battery monitor. Useful for alerting you that the battery is becoming discharged.☆20Oct 7, 2016Updated 9 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- synced is a user space Synchronous Ethernet (Sync-E) stack for the Linux operating system. synced facilitates Sync-E, according to the IT…☆11Feb 5, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Build a statically-linked musl toolchain via an npm module.☆11Nov 3, 2023Updated 2 years ago
- Projection mapping examples in Processing☆20Jul 13, 2012Updated 13 years ago
- NAT Pinning exploit tool for penetration testers.☆34Jan 20, 2014Updated 12 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Extract Wi-Fi passwords from a non-rooted (really) Android phone☆18Feb 26, 2023Updated 3 years ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- Wingpanel Ayatana-Compatibility Indicator☆12Dec 18, 2017Updated 8 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- Follow the Lights boot sector game in only 510 bytes of x86 machine code.☆14Mar 9, 2020Updated 6 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago