ddworken / 2200087-Serial-ProtocolLinks
A reverse engineered protocol description and accompanying code for Radioshack's 2200087 multimeter
☆13Updated 8 years ago
Alternatives and similar repositories for 2200087-Serial-Protocol
Users that are interested in 2200087-Serial-Protocol are comparing it to the libraries listed below
Sorting:
- ☆24Updated 4 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated last week
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 13 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- Application Security library☆11Updated 13 years ago
- lkm rootkit☆15Updated 11 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆40Updated 13 years ago
- AHA! badge designs☆17Updated 2 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Updated 3 years ago
- simple rootkit for computer security class☆15Updated 13 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Application for random attack on Green Petya's key☆25Updated 8 years ago
- A Unix rootkit☆16Updated 5 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 9 years ago
- Set of useful scrpts☆10Updated 11 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- ☆11Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- it's a simple LKM rootkit.☆12Updated 9 years ago
- A new technique to bypass microsoft's applocker.☆12Updated 10 years ago
- ☆10Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- All-in-one, portable, collection of general-purpose cryptography tools☆47Updated 7 years ago
- Post-explotation Hacks☆14Updated 7 years ago