chorankates / h4ck
a collection of writeups and tools related to ~embedded device ~hacking
☆141Updated 6 years ago
Alternatives and similar repositories for h4ck:
Users that are interested in h4ck are comparing it to the libraries listed below
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆60Updated 6 years ago
- Stargate☆94Updated 8 years ago
- A reverse shell cheat-sheet tool☆39Updated 6 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆253Updated 2 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆118Updated 5 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- KeySniffer device discovery tools and public advisories☆117Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Rogue Synergy server☆18Updated 8 years ago
- ☆25Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆68Updated 6 years ago
- New firmware for the DEFCON 24 badge☆8Updated 8 years ago
- ☆46Updated 5 years ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- Let's brute force this hotel's tv.☆76Updated 5 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆112Updated 8 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- How to use a DigiSpark like a RubberDucky☆24Updated 8 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 4 years ago
- Universal Plug and Fuzz☆42Updated 5 years ago