mytechnotalent / dc540-0x00002Links
DC540 hacking challenge 0x00002 [MicroPython CTF].
☆12Updated 2 months ago
Alternatives and similar repositories for dc540-0x00002
Users that are interested in dc540-0x00002 are comparing it to the libraries listed below
Sorting:
- Network Traffic Fuzzer☆17Updated last year
- DC540 hacking challenge 0x00005b.☆16Updated 2 months ago
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Updated 4 months ago
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Updated 3 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- BINARLY Research Tools and PoCs☆39Updated last year
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Updated 2 months ago
- ☆25Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- ASUS wifi router RCE vulnerability☆18Updated 3 months ago
- ☆28Updated 4 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 2 weeks ago
- ☆11Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Updated last year
- PCILeech HP iLO4 Service☆24Updated 7 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago