devttys0 / wrt120nLinks
☆57Updated 11 years ago
Alternatives and similar repositories for wrt120n
Users that are interested in wrt120n are comparing it to the libraries listed below
Sorting:
- Firmware analysis gone wild.☆41Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- ☆23Updated 4 years ago
- ☆22Updated 9 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆85Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 12 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- Tools for viewing and extracting HDD firmware files☆74Updated 10 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated last year
- Cable modem firmware dump☆41Updated 10 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- ☆24Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 5 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago