bmaia / cross-utilsLinks
Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)
☆79Updated 8 years ago
Alternatives and similar repositories for cross-utils
Users that are interested in cross-utils are comparing it to the libraries listed below
Sorting:
- ☆137Updated 7 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 10 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆124Updated 12 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated 2 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- Security advisories☆168Updated 9 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 5 years ago
- hid emulation tools for the usbarmory☆67Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- lte security☆42Updated 10 years ago
- ☆198Updated 10 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆94Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- BitErrant☆59Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- ☆45Updated 3 weeks ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆100Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Parallel APK analyzer☆51Updated 9 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆118Updated 8 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Updated 11 years ago
- Published security vulnerabilities, research, and associated information.☆138Updated 6 years ago