hackerhouse-opensource / electionhackingLinks
Diebold Accuvote-TSx Election Machine Hacking
☆39Updated 5 years ago
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆48Updated 4 years ago
- ARP Man-in-the-Middle tool☆29Updated 5 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆24Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆16Updated last year
- DC540 hacking challenge 0x00005b.☆17Updated last year
- ☆16Updated 3 years ago
- Powershell script to find writable files on a system☆12Updated 8 years ago
- ☆11Updated 4 years ago
- ☆13Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- ☆22Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- talking LED mask for BSides 2020 presenters☆22Updated 4 years ago
- ☆20Updated 4 years ago