Tawnos / hikvision-source
Making the hikvision source code available as I receive it
☆12Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for hikvision-source
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- Remote Code Execution exploit on TVT DVR☆61Updated 3 years ago
- Tools for Hikvision IP cameras☆52Updated 10 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 10 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 7 years ago
- The Asus routers infosvr security issue exploits for Windows☆8Updated 9 years ago
- open telnet port on modern HiSilicon devices☆52Updated 4 years ago
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- Masscan and Dahua parser to xml for Smart PSS☆14Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Some NSE scripts to search information from routers☆37Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Tools, scripts and patches for Atheros wireless☆26Updated 7 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Honeypot built to mimic an insecure GoAhead Wifi Camera☆19Updated 7 years ago
- IDAPython plugin for Tensilica Xtensa (as seen in ESP8266), version 2☆34Updated 7 years ago
- 1st phase of mifare classic nested auth key recovery☆22Updated 6 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆17Updated 10 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆47Updated 8 years ago
- ☆30Updated 8 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆48Updated 6 years ago