hackerhouse-opensource / electionhacking
Diebold Accuvote-TSx Election Machine Hacking
☆39Updated 5 years ago
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆23Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- ☆13Updated 7 years ago
- Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with al…☆72Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆14Updated 11 years ago
- THC "R U There" network discovery tool☆27Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- MimeCast Password Spraying Tool☆46Updated 5 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆43Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Tool to recursively download versioned source code from .svn directories (pre Subversion-1.7 "WC-NG" format)☆8Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago