motherboardgithub / bxaq
☆269Updated 5 years ago
Alternatives and similar repositories for bxaq:
Users that are interested in bxaq are comparing it to the libraries listed below
- Frontend for https://shadowban.eu/☆120Updated 3 years ago
- ☆467Updated 2 months ago
- Avast JavaScript Interactive Shell☆667Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 4 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,404Updated 6 years ago
- Intel ME 11.x Firmware Images Unpacker☆616Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆620Updated 4 years ago
- The USG is Good, not Bad☆405Updated 5 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆116Updated 6 years ago
- lovense hush buttplug exploit chain☆214Updated 5 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 6 years ago
- Automated wanadecrypt with key recovery if lucky☆788Updated 7 years ago
- Proof-of-concept for the ZombieLoad attack☆813Updated 3 years ago
- TESLA PowerWall 2 Security Shenanigans☆459Updated 8 months ago
- GTRS - Google Translator Reverse Shell☆616Updated 3 months ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- A guide and tool for cracking ssh known_hosts files with hashcat☆325Updated last year
- Snowden Archive: The SIDtoday Files☆402Updated 5 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆174Updated 6 years ago
- Scans of North Korean IP Space☆190Updated 4 years ago
- An efficient browser extension to block browser-based cryptocurrency miners all over the web.☆650Updated last year
- PoC for a NTFS crash that I discovered, in various Windows versions☆596Updated 8 months ago
- A basic tool for pushing a web page to multiple archiving services at once.☆212Updated 7 months ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Digest, stat, and copy files from one location to another in the same read pass☆331Updated 5 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆153Updated 7 years ago
- ☆233Updated 7 years ago
- Check if your VPN leaks your IP address via the WebRTC technology☆179Updated 6 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆233Updated 2 years ago
- Named vulnerabilities and their practical impact☆433Updated 3 years ago