chorankates / h4ckLinks
a collection of writeups and tools related to ~embedded device ~hacking
☆144Updated 7 years ago
Alternatives and similar repositories for h4ck
Users that are interested in h4ck are comparing it to the libraries listed below
Sorting:
- Stargate☆95Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Rogue AP killer☆92Updated 7 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆87Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Updated 5 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- ☆106Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- ☆148Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- ☆47Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆120Updated 5 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆55Updated 6 years ago