hackerhouse-opensource / pyongyang_2407
Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. This repository contains installation instructions, hardware documentation and exploits for disabling censorship tools of North Korea Android.
☆71Updated 6 years ago
Alternatives and similar repositories for pyongyang_2407:
Users that are interested in pyongyang_2407 are comparing it to the libraries listed below
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆50Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated last year
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆23Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆34Updated 6 years ago
- Python libraries for Windows system coding☆14Updated 4 years ago
- ☆20Updated 3 years ago
- A proof-of-concept for CVE-2020-12753☆41Updated 4 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆13Updated 10 years ago
- APT34/OILRIG leak☆12Updated 5 years ago
- A repository with UEFI research stuff☆14Updated last year
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Ultimaker 2/2+ firmware with extruder fan control + interposer board☆10Updated 5 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆48Updated last month
- ☆26Updated 5 years ago
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated 11 months ago
- ☆69Updated 6 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆9Updated last year
- ☆13Updated 4 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆23Updated 2 years ago
- ☆33Updated 2 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago