ortegaalfredo / kscopeLinks
☆153Updated 7 years ago
Alternatives and similar repositories for kscope
Users that are interested in kscope are comparing it to the libraries listed below
Sorting:
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 10 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- Visual reverse engineering tool.☆279Updated 8 years ago
- WiFi Tracker Confuser☆64Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Summary and archives of leaked Russian TLD DNS data☆187Updated 8 years ago
- ☆50Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆35Updated 11 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- ☆352Updated 4 years ago
- random brain dumps☆349Updated 8 years ago
- BitErrant☆59Updated 8 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- ☆470Updated 10 months ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆588Updated 4 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆266Updated last year