ortegaalfredo / kscope
☆150Updated 7 years ago
Alternatives and similar repositories for kscope:
Users that are interested in kscope are comparing it to the libraries listed below
- Linux Memory Cryptographic Keys Extractor☆234Updated last year
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Medfusion 4000 security research & a MQX RCE.☆335Updated 7 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Summary and archives of leaked Russian TLD DNS data☆183Updated 7 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- BitErrant☆58Updated 7 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆95Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆276Updated 9 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 7 years ago
- Stargate☆94Updated 8 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆35Updated 10 years ago
- Various PoCs☆490Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆25Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago