devttys0 / littleblackboxLinks
Database of private SSL/SSH keys for embedded devices
☆261Updated last year
Alternatives and similar repositories for littleblackbox
Users that are interested in littleblackbox are comparing it to the libraries listed below
Sorting:
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- ☆143Updated 8 years ago
- ☆230Updated 2 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆138Updated 7 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆288Updated last year
- The USB host security assessment tool☆281Updated 6 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- ☆48Updated 9 years ago
- random brain dumps☆347Updated 7 years ago
- Private keys that have become public ...☆178Updated 2 months ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Wolves Among the Sheep☆147Updated last year
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 8 years ago
- ☆280Updated 5 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆139Updated 2 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 4 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- ☆163Updated 8 years ago