jmcph4 / crackerjackLinks
A collection of crackmes
☆40Updated 9 months ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- ld_preload userland rootkit☆35Updated 4 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆16Updated 9 years ago
- Learning about disassembling☆20Updated 6 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- Misc PoCs for various research topics☆21Updated 3 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 7 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- unbox - Unpack and Decompile the $h*! out of things☆46Updated 7 years ago
- All related files and slides for past talks☆44Updated 2 years ago