PlanetRenox-zz / in0sight
Communicate undetected in plain sight using zero width obfuscation.
☆15Updated 3 years ago
Alternatives and similar repositories for in0sight:
Users that are interested in in0sight are comparing it to the libraries listed below
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ☆34Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- History and analysis of Windows desktop images☆17Updated 4 years ago
- ☆15Updated 4 years ago
- ☆12Updated 2 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- ☆44Updated 6 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 6 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 4 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆10Updated 5 years ago
- trustor (PoC)☆25Updated 3 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆43Updated 5 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆11Updated 10 months ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆17Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- ☆29Updated 5 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 5 years ago
- The future of the decentralized internet begins with the community [L0]☆10Updated 7 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- ☆15Updated 8 years ago
- scripts, etc...☆36Updated 11 months ago
- ☆36Updated 5 years ago
- ☆8Updated 3 years ago