devttys0 / littleblackbox
Database of private SSL/SSH keys for embedded devices
☆257Updated last year
Alternatives and similar repositories for littleblackbox:
Users that are interested in littleblackbox are comparing it to the libraries listed below
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- ☆140Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆288Updated last year
- scripts and examples for using JTAG debug tools to gain root access☆176Updated 9 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆257Updated 3 years ago
- The USB host security assessment tool☆276Updated 6 years ago
- Private keys that have become public ...☆173Updated 2 weeks ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- ☆137Updated 6 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆133Updated 9 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 5 years ago
- ☆228Updated 2 years ago
- RHme+ 2015 challenge☆109Updated 8 years ago
- ☆160Updated 7 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 7 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated this week
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- Conference slides and White-papers☆356Updated 5 years ago
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- random brain dumps☆345Updated 7 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- CANAPE Network Testing Tool☆183Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago