hackerhouse-opensource / electionhackingLinks
Diebold Accuvote-TSx Election Machine Hacking
☆39Updated 5 years ago
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A collection of tools created for computer security research purposes.☆125Updated 5 years ago
- ARP Man-in-the-Middle tool☆30Updated 7 months ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated 5 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- ☆25Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 5 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆64Updated 2 months ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with al…☆77Updated 6 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 6 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆26Updated 4 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Let's brute force this hotel's tv.☆81Updated 5 years ago