Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. This repository contains installation instructions, hardware documentation and exploits for disabling censorship tools of North Korea Android.
☆95Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for pyongyang_2407
Users that are interested in pyongyang_2407 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 2 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆182Feb 2, 2026Updated 2 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆468Feb 22, 2026Updated 2 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated 2 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Tools used in our 34C3 talk, DPRK Consumer Technology☆18Dec 27, 2017Updated 8 years ago
- WPA2 Enterprise secure and easy Wi-Fi access for guests.☆15Jul 10, 2020Updated 5 years ago
- Hunt and Analyze Tor Onion Sites☆24Dec 8, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆139Feb 2, 2026Updated 2 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 2 months ago
- The BXAQ malware is used in China. They force tourists to install this app at the border. The malware downloads a tourist’s text messages…☆10Jul 12, 2019Updated 6 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 2 months ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 12 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- UAC bypass for x64 Windows 7 - 11☆840Feb 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Quic Pluggable Transport for Tor.☆18Feb 23, 2026Updated 2 months ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 6 months ago
- Collection of data about URL filtering in various countries☆45Sep 21, 2016Updated 9 years ago
- Notable characters, codepoints, and resources☆19Sep 14, 2025Updated 7 months ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- Reverts all changes made to Windows 10 (including disabled Cortana), caused by "Destroy Windows Spying" Tool [DWS_Lite.exe] to default st…☆10Dec 15, 2017Updated 8 years ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆346Feb 2, 2026Updated 2 months ago
- A support API written in Kotlin to simplify scripting with kscript☆16Sep 1, 2021Updated 4 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 4 years ago
- MEGA SDK - Client Access Engine Coverity Scan Build Status MEGA --- The Privacy Company --- is a Secure Cloud Storage provider that prote…☆19Dec 13, 2015Updated 10 years ago
- An open source rhythm game, playable with or without a touchscreen.☆15Oct 22, 2025Updated 6 months ago
- iOS UIWebView category to remove the top and bottom shadow that Apple automatically adds to every webview. This is particularly useful if…☆34May 17, 2013Updated 12 years ago
- ☆17Feb 13, 2022Updated 4 years ago
- Windows executable "de-escalator".☆13Aug 9, 2022Updated 3 years ago