chorankates / h4ckLinks
a collection of writeups and tools related to ~embedded device ~hacking
☆143Updated 7 years ago
Alternatives and similar repositories for h4ck
Users that are interested in h4ck are comparing it to the libraries listed below
Sorting:
- Stargate☆95Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Rogue AP killer☆90Updated 7 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- ☆47Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆85Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- CableTap public disclosure documents.☆79Updated 8 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆119Updated 5 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆63Updated 8 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated last year
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- ☆144Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago