hackerhouse-opensource / electionhackingLinks
Diebold Accuvote-TSx Election Machine Hacking
☆40Updated this week
Alternatives and similar repositories for electionhacking
Users that are interested in electionhacking are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated this week
- Papers, presentations and documents from the team at Hacker House.☆52Updated this week
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- A collection of tools created for computer security research purposes.☆135Updated this week
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated this week
- Still point in moving world.☆49Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- ☆12Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- ARP Man-in-the-Middle tool☆31Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆60Updated 7 years ago
- Generate CIA/NSA style project codenames☆21Updated 8 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 3 weeks ago
- Local Privilege Escalation Miner☆32Updated 3 years ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆46Updated 5 years ago
- Created by Jeffrey Martin via the GitHub Connector☆27Updated 11 months ago
- ☆11Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 6 months ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago