chorankates / h4ckLinks
a collection of writeups and tools related to ~embedded device ~hacking
☆143Updated 7 years ago
Alternatives and similar repositories for h4ck
Users that are interested in h4ck are comparing it to the libraries listed below
Sorting:
- Stargate☆95Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- ☆145Updated 9 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- ☆47Updated 5 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Rogue AP killer☆90Updated 7 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆86Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- File transfer via DNS☆73Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- ☆106Updated 9 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆63Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆119Updated 5 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆145Updated 10 years ago
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- A shellcode testing harness.☆70Updated last year
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago