kernelcon / hacker-hotkeyLinks
This repo contains example software for the Kernelcon 2021 Hack Live! badge - the Hacker HotKey.
☆17Updated 4 years ago
Alternatives and similar repositories for hacker-hotkey
Users that are interested in hacker-hotkey are comparing it to the libraries listed below
Sorting:
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- first commit☆20Updated last week
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- ☆29Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 4 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Utility to decompress Linux swsusp hibernation file.☆29Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- ☆48Updated last month
- Conferences, tools, papers, etc.☆43Updated 3 months ago
- Next Generation of White Chapel☆21Updated 10 years ago
- API to use Cymru services☆27Updated 11 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago