chorankates / h4ckLinks
a collection of writeups and tools related to ~embedded device ~hacking
☆143Updated 7 years ago
Alternatives and similar repositories for h4ck
Users that are interested in h4ck are comparing it to the libraries listed below
Sorting:
- Stargate☆95Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Rogue Synergy server☆18Updated 8 years ago
- ☆47Updated 5 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆87Updated 3 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Rogue AP killer☆92Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆56Updated 4 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆85Updated 5 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆120Updated 5 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆63Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- Distributed wrapper around oclHashcat☆91Updated 7 months ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Updated last year
- CableTap public disclosure documents.☆78Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆70Updated 9 years ago
- File transfer via DNS☆73Updated 8 years ago