hackerhouse-opensource / electionhackingLinks
Diebold Accuvote-TSx Election Machine Hacking
☆40Updated 5 years ago
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated 6 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- PCILeech HP iLO4 Service☆25Updated 6 years ago
- A collection of tools created for computer security research purposes.☆135Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ARP Man-in-the-Middle tool☆30Updated last year
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆67Updated 7 months ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- Network Traffic Fuzzer☆17Updated last year