devttys0 / wrt120n
☆57Updated 11 years ago
Alternatives and similar repositories for wrt120n:
Users that are interested in wrt120n are comparing it to the libraries listed below
- Firmware analysis gone wild.☆42Updated 10 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- ☆80Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆35Updated 10 years ago
- ☆14Updated 10 years ago
- ☆22Updated 3 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 6 months ago
- Instrumented MIPS kernel☆13Updated 4 years ago
- Tools for viewing and extracting HDD firmware files☆72Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆55Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆85Updated 10 years ago
- ☆24Updated 9 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆36Updated 8 years ago
- lte security☆41Updated 9 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆21Updated 9 years ago
- ☆32Updated 8 months ago
- ☆16Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago