Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. This repository contains installation instructions, hardware documentation and exploits for disabling censorship tools of North Korea Android.
☆95Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for pyongyang_2407
Users that are interested in pyongyang_2407 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 2 months ago
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 2 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆182Feb 2, 2026Updated 2 months ago
- A web-based viewer for North Korean dictionary files provided by the E-C-K app.☆15Nov 11, 2020Updated 5 years ago
- Word2Vec Word Vectors trained on a North Korean Corpus / 조선어 (북한어) 단어 임베딩☆13Apr 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 2 months ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Tools used in our 34C3 talk, DPRK Consumer Technology☆18Dec 27, 2017Updated 8 years ago
- WPA2 Enterprise secure and easy Wi-Fi access for guests.☆15Jul 10, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Hunt and Analyze Tor Onion Sites☆24Dec 8, 2022Updated 3 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- local b=game:GetService("Players")local c=game:GetService("ReplicatedStorage")local d=game:GetService("StarterGui")local e=game:GetServic…☆10Jan 27, 2022Updated 4 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Terminal for the distributed web☆20May 1, 2020Updated 5 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- ☆13Mar 17, 2023Updated 3 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- MEGA SDK - Client Access Engine Coverity Scan Build Status MEGA --- The Privacy Company --- is a Secure Cloud Storage provider that prote…☆19Dec 13, 2015Updated 10 years ago
- iOS UIWebView category to remove the top and bottom shadow that Apple automatically adds to every webview. This is particularly useful if…☆35May 17, 2013Updated 12 years ago
- ☆17Feb 13, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Deepfakes Software For All☆10Feb 21, 2020Updated 6 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- 0902 Steam Console Client (c) Valve Corporation 0902 -- type 'quit' to exit -- 0902 Loading Steam API...OK. 0902 0903 Connecting anonymo…☆14Jan 15, 2021Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago