qkaiser / awind-researchLinks
This repository holds interesting bits and pieces related to research I performed on wireless presentation devices manufactured by Awindinc and OEM'ed to multiple manufacturers.
☆13Updated 4 years ago
Alternatives and similar repositories for awind-research
Users that are interested in awind-research are comparing it to the libraries listed below
Sorting:
- #INFILTRATE19 raptor's party pack.☆32Updated last month
- The Multiplatform Linux Sandbox☆16Updated last year
- Useful Windows and AD tools☆15Updated 3 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- ☆12Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- SharePoint Security Auditor☆21Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ☆16Updated 5 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆21Updated 6 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 11 months ago
- Small fuzzing library with an example script using it.☆20Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆29Updated 3 weeks ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- various slides and presentations I've worked on☆19Updated 8 months ago
- ☆17Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- pwntools for go!☆12Updated 6 years ago
- ☆13Updated 5 years ago