jmcph4 / crackerjack
A collection of crackmes
☆39Updated 5 years ago
Related projects: ⓘ
- A badass grabbing tool for getting PDF's of books.☆26Updated 6 years ago
- Misc PoCs for various research topics☆21Updated last year
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆18Updated last year
- Browser agnostic extension that enables pasting into password fields...☆15Updated 4 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆26Updated 7 years ago
- scripts, etc...☆36Updated 7 months ago
- Learning about disassembling☆20Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- ☆15Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated last month
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 6 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- ☆10Updated this week
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Copy of the contents at phrack.com☆34Updated 3 weeks ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- ☆19Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago