kernelcon / hacker-hotkeyLinks
This repo contains example software for the Kernelcon 2021 Hack Live! badge - the Hacker HotKey.
☆16Updated 4 years ago
Alternatives and similar repositories for hacker-hotkey
Users that are interested in hacker-hotkey are comparing it to the libraries listed below
Sorting:
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- New firmware for the DEFCON 24 badge☆8Updated 8 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Misc malware stuff☆10Updated 4 years ago
- Some rules, scripts of some use to us☆9Updated 7 months ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- ☆28Updated 4 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Updated 2 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Updated 13 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- ☆28Updated 9 months ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆38Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Beagle(bone) in the Middle☆25Updated 4 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- API to use Cymru services☆27Updated 11 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- first commit☆20Updated last year
- How I hacked mine..☆20Updated 5 years ago