ortegaalfredo / kscopeLinks
☆153Updated 8 years ago
Alternatives and similar repositories for kscope
Users that are interested in kscope are comparing it to the libraries listed below
Sorting:
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 8 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- ☆471Updated last year
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆124Updated 12 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- ☆352Updated 4 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- WiFi Tracker Confuser☆64Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 10 years ago
- Visual reverse engineering tool.☆283Updated 8 years ago
- random brain dumps☆350Updated 8 years ago
- Medfusion 4000 security research & a MQX RCE.☆340Updated 7 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- ☆479Updated last month
- ☆50Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆268Updated last year
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 9 years ago
- Wristband research tools☆31Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago