hackerschoice / thc-tesla-powerwall2-hackView external linksLinks
TESLA PowerWall 2 Security Shenanigans
☆462May 9, 2024Updated last year
Alternatives and similar repositories for thc-tesla-powerwall2-hack
Users that are interested in thc-tesla-powerwall2-hack are comparing it to the libraries listed below
Sorting:
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆749Sep 3, 2025Updated 5 months ago
- ARP Man-in-the-Middle tool☆31Dec 17, 2024Updated last year
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- Subaru StarLink persistent root code execution.☆587Sep 28, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆768Jan 11, 2024Updated 2 years ago
- 4-Port High Power USB 2.0 Hub☆189Nov 4, 2019Updated 6 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- rot13 for the Unicode generation☆127Aug 3, 2025Updated 6 months ago
- Docker environment for hackers☆17Jun 20, 2020Updated 5 years ago
- DNS covert channel implant for Red Teams.☆734Jan 10, 2020Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Nov 18, 2019Updated 6 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Feb 25, 2021Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,310Jul 27, 2021Updated 4 years ago
- ☆41May 16, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- Apfell Golang macOS/Linux/Windows implant☆90Jul 31, 2021Updated 4 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- Open source Uber PoC #deleteuber☆92Feb 26, 2020Updated 5 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- ☆15Mar 17, 2020Updated 5 years ago
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆115Feb 17, 2020Updated 5 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆817Sep 8, 2019Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆13Jul 3, 2019Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆216Oct 7, 2019Updated 6 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Tracking history of USB events on GNU/Linux☆1,179Oct 3, 2022Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆602Mar 2, 2021Updated 4 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago