hackerhouse-opensource / electionhackingLinks
Diebold Accuvote-TSx Election Machine Hacking
☆40Updated 5 years ago
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- 🔵 ethereum grid trading bot☆35Updated last month
- "A Practical Recipe for Hardware Implants" presentation materials.☆14Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Trying to hack into keyboards☆86Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆67Updated 5 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A git history of Windows filesystems☆76Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago