elongl / linksys-wrt54gLinks
Exploiting Linksys WRT54G using a vulnerability I found.
☆37Updated 4 years ago
Alternatives and similar repositories for linksys-wrt54g
Users that are interested in linksys-wrt54g are comparing it to the libraries listed below
Sorting:
- Configure SPI flash write protection.☆24Updated 5 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Fork Free Fail Repeat☆48Updated 4 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆68Updated 8 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Updated 4 years ago
- Hacky scripts to fixup stack strings in Ghidra's decompiler.☆36Updated 3 years ago
- Official x64dbg plugin for Binary Ninja☆85Updated 3 weeks ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Updated 5 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Ghidra plugin to communicate with radare2☆68Updated 2 months ago
- Program for extracting TLS keys from Oculus Runtime☆53Updated 5 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- ☆96Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Kernel and filesystem extractor☆61Updated 3 years ago
- A binary hardening system☆111Updated 2 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- bunch of random stuff☆21Updated 5 years ago
- Scripts from Ghidra Golf competitions☆34Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- Binary Golf Library☆61Updated 4 years ago
- Use Ghidra Structs in Python☆30Updated 4 years ago
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆32Updated last month
- capa explorer for Cutter.☆46Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 3 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago