hackerhouse-opensource / pyongyang_2407Links
Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. This repository contains installation instructions, hardware documentation and exploits for disabling censorship tools of North Korea Android.
☆93Updated last week
Alternatives and similar repositories for pyongyang_2407
Users that are interested in pyongyang_2407 are comparing it to the libraries listed below
Sorting:
- Diebold Accuvote-TSx Election Machine Hacking☆40Updated last week
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- Papers, presentations and documents from the team at Hacker House.☆52Updated last week
- ARP Man-in-the-Middle tool☆31Updated last year
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 7 years ago
- ☆70Updated 7 years ago
- Python libraries for Windows system coding☆15Updated 5 years ago
- You can delete all messages from the telegram chat by specifying its ID☆19Updated 3 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated last week
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆42Updated 7 years ago
- Scapy tools and scripts☆20Updated 5 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 9 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆60Updated 7 years ago
- Get clients and access points.☆48Updated 6 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 7 months ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- USBNinja Android Remote Control Application☆32Updated 6 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆66Updated 8 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Updated 9 years ago
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is …☆22Updated 4 months ago
- A tool for recover router password☆33Updated 7 years ago
- arp-poison (aka arp spoof) tool☆41Updated 12 years ago
- Framework for Man-In-The-Middle attacks☆22Updated 8 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago