ine-labs / GearGoat
Python implementation inspired from ICSim
☆22Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for GearGoat
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆108Updated 9 months ago
- Simulator forked from ICSim used during Car Hacking Workshops☆14Updated 2 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆83Updated 6 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆37Updated 2 weeks ago
- ☆49Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆26Updated 3 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated last year
- BINARLY Research Tools and PoCs☆34Updated last month
- Lena's scripts/code/resources for malware analysis☆25Updated 4 months ago
- ☆23Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆47Updated last year
- ☆35Updated 11 months ago
- ☆49Updated 3 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated 11 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆21Updated last month
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆84Updated 2 months ago
- a map for the azure oriented pentests☆65Updated last year
- Proof-of-Concept for CVE-2024-46538☆44Updated this week
- Generate a report with charts and statistics about cracked passwords in XLSX format☆31Updated 11 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 8 months ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆29Updated 10 months ago
- DEFCON30 Talk Material, References and Extra Bits☆36Updated 2 years ago
- ☆29Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆38Updated last month
- ☆10Updated 3 months ago