hackerhouse-opensource / electionhackingLinks
Diebold Accuvote-TSx Election Machine Hacking
☆40Updated 5 years ago
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- ARP Man-in-the-Middle tool☆30Updated 10 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with al…☆79Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated last month
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆66Updated 5 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated 5 years ago