Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers
☆98Sep 10, 2025Updated 7 months ago
Alternatives and similar repositories for DEFCON-33
Users that are interested in DEFCON-33 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 9 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- ☆77Jul 12, 2025Updated 9 months ago
- list of resource about low level dev☆18Nov 15, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows C++ Implant for Exploration C2☆48May 1, 2026Updated last week
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- ☆13Oct 24, 2024Updated last year
- Force target victim to unsafe network☆31Jun 6, 2025Updated 11 months ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Unstructured.io API GUI☆11Aug 6, 2023Updated 2 years ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 9 months ago
- ☆50Oct 14, 2025Updated 6 months ago
- Malware traffic obfuscation library☆38Jul 24, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆45Mar 13, 2026Updated last month
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- tiktok tools | scrapping | automation☆33Nov 10, 2025Updated 5 months ago
- Linux kernel integrity monitor for detecting syscall hooking☆85Feb 16, 2026Updated 2 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- PCB layout for my cheap FPGA HDMI experimenting board☆10Aug 21, 2014Updated 11 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆51Jan 16, 2025Updated last year
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Mar 21, 2025Updated last year
- Airspace visualizer app with ADS-B and ACARS integration. AI chatbot back-end via Ollama☆103Sep 9, 2025Updated 7 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)☆52Jul 14, 2025Updated 9 months ago
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆84Dec 20, 2023Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- ☆25Apr 29, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Backdooring VSCode Projects☆130Jun 5, 2025Updated 11 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Feb 22, 2023Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Jan 7, 2026Updated 4 months ago
- cellular-infrastructure 3G v2017☆17Oct 29, 2020Updated 5 years ago
- Spydi ThreatIntel Feed is built on open-source threat intelligence, community-maintained blocklists, and public security research.☆53Updated this week