Various projects aiming at unlocking and programming the MINI54ZAN microcontroller
☆17Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for SWD-Hacking
Users that are interested in SWD-Hacking are comparing it to the libraries listed below
Sorting:
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A gui for Jlink commander,Flash erase,firmware download,read UID☆16Mar 9, 2017Updated 8 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- ☆24Feb 15, 2013Updated 13 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- python tor client☆27Sep 19, 2015Updated 10 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Reverse engineering of the JD385 Quadrocopter☆51May 20, 2014Updated 11 years ago
- Standalone OpenOCD and CMSIS-SVD based peripheral register viewer written on Python☆37Jan 14, 2019Updated 7 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago
- A collection of scripts to help manage users and groups in LDAP☆11Mar 22, 2016Updated 9 years ago
- DeepAlign: Alignment-based Process Anomaly Correction Using Recurrent Neural Networks☆10Mar 25, 2023Updated 2 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Manufacture peripheral Library - MPLib, modified by CooCox in order to add to CoIDE(http://www.coocox.org)☆12Jul 24, 2014Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- 3D Room Mapping Arduino Robot☆12Dec 6, 2016Updated 9 years ago
- ☆11Aug 25, 2014Updated 11 years ago
- Arduino Library for the CT1642 Led Driver and Key Scanner IC☆13Oct 6, 2020Updated 5 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆10Dec 10, 2013Updated 12 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- SmartWatch Project on Arduino and Android☆12Aug 23, 2024Updated last year
- Project examples☆12Feb 15, 2016Updated 10 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Extension for the SenTestingKit for asynchronous testing☆104May 20, 2013Updated 12 years ago
- A pytest plugin for orchestrating tests☆12Jul 18, 2019Updated 6 years ago
- ☆11Feb 2, 2023Updated 3 years ago