chorankates / h4ck
a collection of writeups and tools related to ~embedded device ~hacking
☆140Updated 6 years ago
Alternatives and similar repositories for h4ck:
Users that are interested in h4ck are comparing it to the libraries listed below
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Stargate☆94Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Rogue AP killer☆89Updated 7 years ago
- ☆25Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆60Updated 6 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 6 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 4 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- ☆106Updated 9 years ago
- ☆46Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆152Updated 4 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- ☆167Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆118Updated 5 years ago
- Red Team Resources☆59Updated 6 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- A reverse shell cheat-sheet tool☆39Updated 6 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- ☆44Updated 2 months ago