detrojones / JunkyardLinks
Cable modem firmware dump
☆41Updated 10 years ago
Alternatives and similar repositories for Junkyard
Users that are interested in Junkyard are comparing it to the libraries listed below
Sorting:
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- Packet-o-matic NG !☆65Updated 3 months ago
- An EFI image parser and dissector☆52Updated 12 years ago
- ☆83Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 11 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆21Updated 10 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- lte security☆41Updated 9 years ago
- ☆36Updated 9 years ago
- JEFF file format tools☆27Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A5/3 Call Encryption Library☆31Updated 9 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Updated 8 years ago
- ☆22Updated 9 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- ChromeCast HubCap exploit☆66Updated 11 years ago
- ☆57Updated 11 years ago
- ☆35Updated 7 years ago
- ☆29Updated 6 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 13 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Updated 6 years ago
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Updated 8 years ago