ortegaalfredo / kscopeLinks
☆151Updated 7 years ago
Alternatives and similar repositories for kscope
Users that are interested in kscope are comparing it to the libraries listed below
Sorting:
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆184Updated 11 months ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- BitErrant☆58Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Medfusion 4000 security research & a MQX RCE.☆336Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- RF retroreflectors☆100Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- ☆472Updated 9 months ago
- Reverse Engineering Page Table Caches in Your Processor☆371Updated 4 years ago
- Wolves Among the Sheep☆147Updated last year
- Sha256 vulnerability for full rounds. Circular hash attack.☆153Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- ☆352Updated 3 years ago