jmcph4 / crackerjack
A collection of crackmes
☆40Updated 3 months ago
Alternatives and similar repositories for crackerjack:
Users that are interested in crackerjack are comparing it to the libraries listed below
- Learning about disassembling☆20Updated 5 years ago
- Magnetic stripe spoofer implementing audio waves.☆38Updated 8 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 6 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Bluetooth Low Energy Device spoofing library☆26Updated 7 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆15Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago