devttys0 / littleblackboxLinks
Database of private SSL/SSH keys for embedded devices
☆265Updated last year
Alternatives and similar repositories for littleblackbox
Users that are interested in littleblackbox are comparing it to the libraries listed below
Sorting:
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- Private keys that have become public ...☆182Updated this week
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆291Updated last year
- ☆144Updated 8 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- The USB host security assessment tool☆281Updated 6 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- ☆380Updated 12 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- ☆138Updated 7 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- WPS related utilities☆165Updated 10 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆234Updated 9 years ago
- Automated Linux evil maid attack☆429Updated 9 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆139Updated 3 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 4 years ago
- random brain dumps☆349Updated 8 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- Security advisories☆168Updated 9 years ago
- ☆230Updated 2 years ago
- ☆106Updated 9 years ago
- ☆111Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago