jmcph4 / crackerjackLinks
A collection of crackmes
☆41Updated last year
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Copy of the contents at phrack.com☆41Updated 10 months ago
- Learning about disassembling☆20Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆50Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- ☆16Updated 9 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- NSA Playset implant for bridging airgaps without radio☆17Updated 10 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- File transfer via DNS☆76Updated 8 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 7 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- unbox - Unpack and Decompile the $h*! out of things☆47Updated 7 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- A collection of Hack The Planet's zines.☆72Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 9 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago