This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
☆201Feb 11, 2026Updated last month
Alternatives and similar repositories for hackEmbedded
Users that are interested in hackEmbedded are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆77May 12, 2022Updated 3 years ago
- ☆72May 15, 2023Updated 2 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆841Dec 25, 2025Updated 2 months ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆114Oct 11, 2023Updated 2 years ago
- ☆19Aug 10, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- ida plugin to parse qt meta data☆85Jan 15, 2025Updated last year
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆229Jun 6, 2023Updated 2 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- some useful configs☆10Oct 7, 2025Updated 5 months ago
- A full-featured open-source Wi-Fi fuzzer☆198Sep 30, 2025Updated 5 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆239Jun 22, 2023Updated 2 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- 固件分析工具☆23Jan 7, 2025Updated last year
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆174Mar 15, 2023Updated 3 years ago
- 2023年西湖论剑IoT-AWD赛题仓库☆20Apr 13, 2023Updated 2 years ago
- ☆23Jul 3, 2022Updated 3 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆59Jun 6, 2023Updated 2 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆26Dec 24, 2025Updated 2 months ago
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated last year
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆501Jan 10, 2023Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆250Jul 9, 2024Updated last year
- 基于elf_patcher和seccomp的自定义过滤syscall的pwn通防☆76Jan 3, 2026Updated 2 months ago
- ☆19Dec 30, 2023Updated 2 years ago
- ☆34Dec 15, 2023Updated 2 years ago
- IoT固件漏洞挖掘工具☆248Nov 11, 2022Updated 3 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Nov 29, 2021Updated 4 years ago
- ☆13Nov 8, 2021Updated 4 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- D-Link firmware decryption PoC☆194Dec 21, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆785Jun 23, 2023Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆978Sep 3, 2023Updated 2 years ago