TESLA PowerWall 2 Security Shenanigans
☆463May 9, 2024Updated last year
Alternatives and similar repositories for thc-tesla-powerwall2-hack
Users that are interested in thc-tesla-powerwall2-hack are comparing it to the libraries listed below
Sorting:
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- ARP Man-in-the-Middle tool☆31Dec 17, 2024Updated last year
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Subaru StarLink persistent root code execution.☆584Sep 28, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆771Jan 11, 2024Updated 2 years ago
- 4-Port High Power USB 2.0 Hub☆189Nov 4, 2019Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- rot13 for the Unicode generation☆127Aug 3, 2025Updated 7 months ago
- Docker environment for hackers☆17Jun 20, 2020Updated 5 years ago
- DNS covert channel implant for Red Teams.☆733Jan 10, 2020Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Nov 18, 2019Updated 6 years ago
- SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some…☆58May 13, 2021Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆143Feb 25, 2021Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- ☆41May 16, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- How To Execute Shellcode via HTA☆141Feb 23, 2018Updated 8 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- ☆15Mar 17, 2020Updated 5 years ago
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆115Feb 17, 2020Updated 6 years ago
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆817Sep 8, 2019Updated 6 years ago
- ☆26Nov 21, 2011Updated 14 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆13Jul 3, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- "PRinter Exploitation Toolkit" LAN automation tool☆215Oct 7, 2019Updated 6 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Tracking history of USB events on GNU/Linux☆1,178Oct 3, 2022Updated 3 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago