hackerhouse-opensource / pyongyang_2407Links
Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. This repository contains installation instructions, hardware documentation and exploits for disabling censorship tools of North Korea Android.
☆79Updated 6 years ago
Alternatives and similar repositories for pyongyang_2407
Users that are interested in pyongyang_2407 are comparing it to the libraries listed below
Sorting:
- Diebold Accuvote-TSx Election Machine Hacking☆40Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- ☆70Updated 6 years ago
- USBNinja Android Remote Control Application☆30Updated 6 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- ARP Man-in-the-Middle tool☆30Updated 10 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Python libraries for Windows system coding☆15Updated 5 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆47Updated 3 months ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆41Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆66Updated 5 months ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 5 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- ☆14Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- A git history of Windows filesystems☆76Updated 5 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Simple windows backdoor command shell.☆20Updated 7 years ago