This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
☆201Feb 11, 2026Updated 2 weeks ago
Alternatives and similar repositories for hackEmbedded
Users that are interested in hackEmbedded are comparing it to the libraries listed below
Sorting:
- bootkit驱动映射,三环进程注入加载指定模块☆14Oct 8, 2024Updated last year
- ☆72May 15, 2023Updated 2 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆228Jun 6, 2023Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆832Dec 25, 2025Updated 2 months ago
- some useful configs☆10Oct 7, 2025Updated 4 months ago
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆175Mar 15, 2023Updated 2 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- 固件分析工具☆23Jan 7, 2025Updated last year
- ☆34Apr 7, 2022Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆114Oct 11, 2023Updated 2 years ago
- ida plugin to parse qt meta data☆85Jan 15, 2025Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆85Feb 22, 2025Updated last year
- Tool developed using csharp (.net 4.5) for compressing and encrypting files to shorten transfer times. Supports multi-file compression an…☆14Feb 15, 2024Updated 2 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78May 12, 2022Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- ☆18Mar 28, 2023Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆240Jun 22, 2023Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆975Sep 3, 2023Updated 2 years ago
- ☆34Dec 15, 2023Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆501Jan 10, 2023Updated 3 years ago
- IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.☆180Feb 10, 2026Updated 2 weeks ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- 跨平台模拟执行unicorn框架基于Qemu的TCG模式(Tiny Code Generator),以无硬件虚拟化支持方式实现全系统的虚拟化,支持跨平台和架构的CPU指令模拟,本文讨论是一款笔者的实验性项目采用Windows Hypervisor Platform虚拟机模式…☆79Dec 17, 2023Updated 2 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆548Feb 1, 2024Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Nov 29, 2021Updated 4 years ago
- ☆19Aug 10, 2022Updated 3 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆622Sep 26, 2023Updated 2 years ago