mytechnotalent / 0x02-ARM-32-Hacking-IntLinks
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
☆11Updated 3 years ago
Alternatives and similar repositories for 0x02-ARM-32-Hacking-Int
Users that are interested in 0x02-ARM-32-Hacking-Int are comparing it to the libraries listed below
Sorting:
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Updated 3 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Updated 6 years ago
- github pages repository☆14Updated 4 months ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆38Updated 12 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated last year
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Updated 5 years ago
- ☆14Updated 6 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆24Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- My malware analysis code snippets☆27Updated 2 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆19Updated 2 years ago
- A simple script to get your fresh Debian based OS ready for hardware hacking/reversing/exploitation☆10Updated 6 years ago
- ☆11Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- A curated collection of scripts for kernel-related devops☆13Updated last year
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago
- ☆13Updated 4 years ago
- ☆28Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago