chorankates / h4ckLinks
a collection of writeups and tools related to ~embedded device ~hacking
☆144Updated 7 years ago
Alternatives and similar repositories for h4ck
Users that are interested in h4ck are comparing it to the libraries listed below
Sorting:
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Updated 7 years ago
- Stargate☆96Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- ☆45Updated last month
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- ☆47Updated 6 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Rogue AP killer☆91Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A simple script for discovery and analysis of UPnP servers☆177Updated 3 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆88Updated 3 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆54Updated 4 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 7 years ago
- ☆147Updated 9 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 5 years ago
- ☆58Updated 11 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- UPnP hacking scripts and tools☆77Updated 9 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago
- Nmap NSE script that captures a screenshot from the host(s) over VNC using vncsnapshot.☆35Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS☆196Updated 6 years ago