Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot
☆59Jan 10, 2019Updated 7 years ago
Alternatives and similar repositories for keyexec
Users that are interested in keyexec are comparing it to the libraries listed below
Sorting:
- Install, update and remove AppImage from your CLI. appimage, linux, package-manager☆19May 21, 2025Updated 9 months ago
- ☆11Apr 30, 2015Updated 10 years ago
- Dedibox Fully Encrypted Debian Install☆18Mar 29, 2020Updated 5 years ago
- Generate a link to the exact commit, file and line.☆14Jan 14, 2023Updated 3 years ago
- A build system to simplify cross compiling statically linked linux applications for android (aarch64 architecture)☆15Jun 18, 2021Updated 4 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Kexec Magisk Module☆21Oct 26, 2020Updated 5 years ago
- Hardened kernel generation - Deprecated☆48Apr 3, 2017Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Bootable 512 byte OS that is a game☆27Sep 28, 2019Updated 6 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Utility to facilitate the building and installation of EFI secure boot kernels under Gentoo Linux.☆44Oct 31, 2020Updated 5 years ago
- Self-signed UEFI- and GRUB-based secure boot system for Ubuntu.☆23Feb 3, 2020Updated 6 years ago
- lte security☆42Nov 17, 2015Updated 10 years ago
- ☆20Apr 16, 2016Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Aug 4, 2016Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- ☆23May 11, 2017Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Automatic detection of hashing algorithms☆20Jun 18, 2016Updated 9 years ago
- Quick & dirty ebuild development scripts☆35Mar 8, 2026Updated last week
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- MachO editor / disassembler. No internet, no os requirements, just need a browser ;)☆12May 13, 2019Updated 6 years ago
- ☆90Mar 15, 2017Updated 9 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago