nachash / htp-zinesLinks
A collection of Hack The Planet's zines.
☆71Updated 9 years ago
Alternatives and similar repositories for htp-zines
Users that are interested in htp-zines are comparing it to the libraries listed below
Sorting:
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- The Zonefile Transfer Toolkit☆28Updated 3 months ago
- ☆18Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Reticle is a C&C network for small devices that want to be friends.☆90Updated 11 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Hacker OPSEC☆96Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A tool for netpens.☆37Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 6 years ago
- Binary exploitation CTF challenge☆24Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Abusing trust boundaries to deliver effective phishing payloads☆34Updated 9 years ago
- Hunting cryptonote-related miners☆22Updated 4 years ago
- A collection of crackmes☆40Updated 5 months ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆18Updated 9 years ago
- Copy of the contents at phrack.com☆39Updated 3 months ago