Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers
☆98Sep 10, 2025Updated 5 months ago
Alternatives and similar repositories for DEFCON-33
Users that are interested in DEFCON-33 are comparing it to the libraries listed below
Sorting:
- list of resource about low level dev☆18Nov 15, 2025Updated 3 months ago
- Unstructured.io API GUI☆11Aug 6, 2023Updated 2 years ago
- Windows C++ Implant for Exploration C2☆44Jan 26, 2026Updated last month
- A generative art framework leveraging adversarial neural networks and style transfer techniques to create unique, AI-crafted NFTs, utiliz…☆15Jul 18, 2025Updated 7 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- A basic arithmetic calculator built for The Odin Project☆32Oct 2, 2025Updated 5 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- ☆13Oct 24, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆32Apr 28, 2025Updated 10 months ago
- ☆76Jul 12, 2025Updated 7 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- tiktok tools | scrapping | automation☆31Nov 10, 2025Updated 3 months ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- ☆23Aug 4, 2025Updated 7 months ago
- Pioneering BookdownR: Intelligent Automation Framework for Modern Data Storytelling Platforms providing enterprise-grade BookdownR soluti…☆28Aug 6, 2025Updated 7 months ago
- Adaptive caching platform utilizing dynamic RedisCache nodes for high-performance, fault-tolerant data processing Studio☆16Sep 6, 2025Updated 6 months ago
- ☆26Apr 29, 2025Updated 10 months ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and its update☆40Feb 16, 2026Updated 2 weeks ago
- A new era for SOCs begins☆24Jun 4, 2025Updated 9 months ago
- ☆27Dec 9, 2025Updated 2 months ago
- Linux kernel integrity monitor for detecting syscall hooking☆73Feb 16, 2026Updated 2 weeks ago
- ☆20Sep 11, 2025Updated 5 months ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 9 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Jul 28, 2025Updated 7 months ago
- automated Open Source Intelligence gathering☆187Nov 23, 2025Updated 3 months ago
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes☆31Aug 16, 2025Updated 6 months ago
- ☆48Oct 14, 2025Updated 4 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- ☆50Jul 9, 2025Updated 7 months ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆155Jan 26, 2026Updated last month
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆47Aug 20, 2025Updated 6 months ago