TESLA PowerWall 2 Security Shenanigans
☆464May 9, 2024Updated 2 years ago
Alternatives and similar repositories for thc-tesla-powerwall2-hack
Users that are interested in thc-tesla-powerwall2-hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 6 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Nov 18, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Subaru StarLink persistent root code execution.☆593Sep 28, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Oct 27, 2021Updated 4 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆774Jan 11, 2024Updated 2 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- How To Execute Shellcode via HTA☆141Feb 23, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 4-Port High Power USB 2.0 Hub☆189Nov 4, 2019Updated 6 years ago
- DNS covert channel implant for Red Teams.☆732Jan 10, 2020Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- CLI tool for PKCS7 padding oracle attacks☆143Feb 25, 2021Updated 5 years ago
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆116Feb 17, 2020Updated 6 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,328Jul 27, 2021Updated 4 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- rot13 for the Unicode generation☆128Aug 3, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- DeepSea Phishing Gear☆123Jul 20, 2020Updated 5 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Avast JavaScript Interactive Shell☆671Mar 12, 2020Updated 6 years ago
- Library for bash utility methods and tools☆674May 13, 2026Updated last week
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆15Mar 17, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- "PRinter Exploitation Toolkit" LAN automation tool☆217Oct 7, 2019Updated 6 years ago
- Broadcom Bluetooth Tools☆15Feb 20, 2018Updated 8 years ago
- This is a concept poc of command and control server implemented over blockchain☆58Aug 13, 2019Updated 6 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆818Sep 8, 2019Updated 6 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆161Jul 22, 2021Updated 4 years ago
- Some of the hidden norms about Hacker News not otherwise covered in the Guidelines and the FAQ.☆3,780Jan 18, 2025Updated last year
- A bare-bones Twitter clone implemented in a single file☆734Apr 9, 2025Updated last year