polkaned / mschapv2acc
MS-CHAP-V2 SHOULD NOT be used...
☆18Updated 2 years ago
Alternatives and similar repositories for mschapv2acc:
Users that are interested in mschapv2acc are comparing it to the libraries listed below
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- ☆57Updated 11 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 6 months ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- ☆15Updated 8 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- Instrumented MIPS kernel☆13Updated 4 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Updated 6 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- lte security☆41Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- ☆80Updated 6 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Run a windows process with many inputs and catch exit codes☆14Updated 9 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆25Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- A hex/binary black box analysis tool☆13Updated 8 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- Set of scripts to deal with Cisco ASA firmware [pack/unpack etc.]☆96Updated 2 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- CTF Finals☆17Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago