b0n0n / MS-fitnessband-jailbreakLinks
simple scripts to parse and patch Microsoft fitness band firmware update file
☆13Updated 2 years ago
Alternatives and similar repositories for MS-fitnessband-jailbreak
Users that are interested in MS-fitnessband-jailbreak are comparing it to the libraries listed below
Sorting:
- Public resources NB shares☆18Updated 9 years ago
- [Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.☆30Updated 8 years ago
- ☆25Updated 10 years ago
- ☆38Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 10 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 9 years ago
- An experimental file formats playground☆88Updated 2 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- ☆25Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- BitErrant☆59Updated 8 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 11 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 2 months ago