sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT
☆16Jul 3, 2017Updated 8 years ago
Alternatives and similar repositories for sonoff-evil
Users that are interested in sonoff-evil are comparing it to the libraries listed below
Sorting:
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Feb 25, 2021Updated 5 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- ☆34Jan 31, 2016Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- This project is designed to enumerate back-end hosting Content Management Systems and aid security professionals in detecting vulnerabili…☆17Mar 14, 2017Updated 8 years ago