kjhulin / CryptokCodeCracker
Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.
☆37Updated 7 years ago
Related projects: ⓘ
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 7 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 3 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆16Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- ☆38Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Remote shell/exfiltration using keyboard leds.☆25Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 6 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆82Updated 3 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆82Updated 6 years ago
- ☆14Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆63Updated 9 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆31Updated 2 years ago
- Purposely Vulnerable Embedded Device☆21Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 6 years ago
- ☆20Updated this week
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- New firmware for the DEFCON 24 badge☆8Updated 8 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago