bmaia / cross-utilsLinks
Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)
☆80Updated 8 years ago
Alternatives and similar repositories for cross-utils
Users that are interested in cross-utils are comparing it to the libraries listed below
Sorting:
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- ☆138Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 4 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- lte security☆41Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- ☆38Updated 8 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Security advisories☆168Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Public release of the RetroScope Android memory forensics framework☆119Updated 5 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 11 months ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆85Updated 10 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- setroubleshootd xSports☆92Updated 8 years ago