devttys0 / littleblackboxLinks
Database of private SSL/SSH keys for embedded devices
☆269Updated 2 years ago
Alternatives and similar repositories for littleblackbox
Users that are interested in littleblackbox are comparing it to the libraries listed below
Sorting:
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 10 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆124Updated 12 years ago
- Private keys that have become public ...☆185Updated this week
- ☆147Updated 9 years ago
- The USB host security assessment tool☆285Updated 7 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆299Updated 2 years ago
- ☆384Updated 13 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆242Updated 9 years ago
- ☆137Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- NTP Main-in-the-Middle tool☆250Updated 3 years ago
- for the louise☆245Updated 5 years ago
- Decept Network Protocol Proxy☆279Updated 3 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- random brain dumps☆351Updated 8 years ago
- Automated Linux evil maid attack☆435Updated 10 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- ☆234Updated 2 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Updated 2 years ago
- CANAPE Network Testing Tool☆184Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 9 years ago
- Purposely Vulnerable Embedded Device☆22Updated 8 years ago
- WPS related utilities☆166Updated 10 years ago
- Transparent network tap☆122Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago