TESLA PowerWall 2 Security Shenanigans
☆463May 9, 2024Updated last year
Alternatives and similar repositories for thc-tesla-powerwall2-hack
Users that are interested in thc-tesla-powerwall2-hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ARP Man-in-the-Middle tool☆31Dec 17, 2024Updated last year
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆760Sep 3, 2025Updated 7 months ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Subaru StarLink persistent root code execution.☆589Sep 28, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆774Jan 11, 2024Updated 2 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Docker environment for hackers☆17Jun 20, 2020Updated 5 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Oct 27, 2021Updated 4 years ago
- rot13 for the Unicode generation☆128Aug 3, 2025Updated 8 months ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- How To Execute Shellcode via HTA☆141Feb 23, 2018Updated 8 years ago
- 4-Port High Power USB 2.0 Hub☆189Nov 4, 2019Updated 6 years ago
- DNS covert channel implant for Red Teams.☆732Jan 10, 2020Updated 6 years ago
- SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some…☆59May 13, 2021Updated 4 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,325Jul 27, 2021Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆143Feb 25, 2021Updated 5 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆54Jan 18, 2020Updated 6 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- ☆41May 16, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GPU rootkit PoC by Team Jellyfish☆120Jul 2, 2015Updated 10 years ago
- An index of archived code and papers. Open an issue to request an addition.☆23Jan 7, 2020Updated 6 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆817Sep 8, 2019Updated 6 years ago
- Avast JavaScript Interactive Shell☆671Mar 12, 2020Updated 6 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Library for bash utility methods and tools☆674Apr 11, 2026Updated last week
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago