hackerhouse-opensource / electionhacking
Diebold Accuvote-TSx Election Machine Hacking
☆39Updated 5 years ago
Alternatives and similar repositories for electionhacking:
Users that are interested in electionhacking are comparing it to the libraries listed below
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆23Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- MimeCast Password Spraying Tool☆46Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Powershell script to find writable files on a system☆12Updated 7 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- ☆35Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Default Payloads to Attach to Emails When Using Gophish☆9Updated 9 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- ☆36Updated 5 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago