Tools for reverse engineering LEGO MINDSTORMS and related products.
☆16Oct 11, 2019Updated 6 years ago
Alternatives and similar repositories for lms-hacker-tools
Users that are interested in lms-hacker-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Arduino firmware and wxPython code for DCC control of trains☆19Feb 23, 2013Updated 13 years ago
- Antenna analyzer based on RigExpert Zero II and Arduino☆13Jan 25, 2024Updated 2 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 5 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Here I store my proof of concepts☆15Sep 6, 2024Updated last year
- ☆20Feb 25, 2026Updated 2 months ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- 8x8 fonts and library for LED matrix and Arduino☆12Dec 30, 2018Updated 7 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Some learning materials, notes and scripts about the programming and security of microcontroller.☆15Mar 15, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- ☆12May 13, 2024Updated last year
- All Solana programs as of 2022-02-11☆19Feb 20, 2022Updated 4 years ago
- This is the library version of DCC++ for Arduino, to control railroading DCC devices.☆25Nov 8, 2020Updated 5 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 10 months ago
- PS3 GameOS Implementation of geohot's hypervisor HTAB glitch exploit☆21Jun 11, 2025Updated 10 months ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- ☆17Aug 19, 2024Updated last year
- Generate lua call graph☆15Apr 23, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆12May 12, 2022Updated 3 years ago
- Cross-browser fingerprinting library that generates fingerprint of a device. It is written in JavaScript.☆13Mar 13, 2019Updated 7 years ago
- find your own delicious colour☆13Aug 22, 2021Updated 4 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Updated this week
- ☆13Jun 27, 2023Updated 2 years ago
- Intel Hex serializer in C#.☆11Jun 22, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Example payload for CVE-2022-21894☆15Sep 27, 2023Updated 2 years ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- Experiments related to CVE-2015-3456☆13May 27, 2015Updated 10 years ago
- Simple PoC causing overflow☆20Oct 11, 2023Updated 2 years ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆15May 22, 2025Updated 11 months ago
- A simple GUI based Virtual Hard Disk Converter. It is used for converting of various virtual disk formats. It’s compatible with Hyper-V, …☆10Apr 14, 2026Updated 2 weeks ago
- A UEFI Application that hooks SetVariable to allow a user-space program to access kernel memory.☆20Jun 15, 2020Updated 5 years ago