jmcph4 / crackerjackLinks
A collection of crackmes
☆40Updated 10 months ago
Alternatives and similar repositories for crackerjack
Users that are interested in crackerjack are comparing it to the libraries listed below
Sorting:
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 7 months ago
- Learning about disassembling☆20Updated 6 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- ☆16Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago