devttys0 / littleblackbox
Database of private SSL/SSH keys for embedded devices
☆253Updated 7 months ago
Related projects: ⓘ
- ☆138Updated 8 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆121Updated 10 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆251Updated 2 years ago
- scripts and examples for using JTAG debug tools to gain root access☆170Updated 8 years ago
- The USB host security assessment tool☆270Updated 5 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆280Updated 9 months ago
- ☆138Updated 6 years ago
- X41 Smartcard Fuzzer☆114Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆63Updated 9 years ago
- Private keys that have become public ...☆169Updated last month
- HORSEPILL rootkit PoC☆221Updated 8 years ago
- RHme+ 2015 challenge☆106Updated 8 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆179Updated 7 years ago
- ☆226Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 4 years ago
- Decept Network Protocol Proxy☆274Updated last year
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Automated Linux evil maid attack☆418Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆204Updated 4 years ago
- ☆370Updated 11 years ago
- CANAPE Network Testing Tool☆183Updated 6 years ago
- NTP Main-in-the-Middle tool☆222Updated 2 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆210Updated 7 years ago
- ☆155Updated 7 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆251Updated last year
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆71Updated 5 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆159Updated 7 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 5 years ago
- The first open source vulnerability scanner for firmwares☆193Updated 8 years ago