repo with compromised keys and such
☆23Dec 29, 2022Updated 3 years ago
Alternatives and similar repositories for compromised-keys
Users that are interested in compromised-keys are comparing it to the libraries listed below
Sorting:
- A smali emulator.☆25Jun 27, 2018Updated 7 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- ☆19Jan 24, 2016Updated 10 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated last year
- Research & Exploitation framework for Qualcomm EDL Firehorse programmers☆16Jan 21, 2018Updated 8 years ago
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A wrapper for adb and fastboot that returns convenient promises.☆26Updated this week
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- ☆49Jan 25, 2018Updated 8 years ago
- A python based tool for exploiting and managing android devices via ADB☆35May 15, 2021Updated 4 years ago
- A Library for Remote Debugging, Autogenerating Settings/Preference UIs, and Wizard-of-Ozing☆27Jun 17, 2024Updated last year
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆27Nov 15, 2017Updated 8 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- This repository contains sEMG Data of 13 subjects recorded with the Myo Armband.☆13Jan 8, 2022Updated 4 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- Tool for cracking password Hashes like MD5, SHA1, SHA256, encrypted PDF, encrypted compressed file,and many other password hashes 🤘🤘☆39Oct 17, 2020Updated 5 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- ADB Usage Complete / ADB 用法大全☆12Jan 17, 2022Updated 4 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Reverse engineered Hyundai Kona Electric CAN signal database☆17Jan 16, 2025Updated last year
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆48Dec 15, 2020Updated 5 years ago
- Lecture topics for the Israeli Node.js community monthly meetups☆12May 30, 2018Updated 7 years ago
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the boo…☆14May 6, 2022Updated 3 years ago
- ☆11Feb 11, 2026Updated 3 weeks ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- ☆10Nov 13, 2021Updated 4 years ago
- Source code to the static website at stockstream.live☆12Feb 28, 2018Updated 8 years ago
- This is a fast introduction to javascript.☆13Nov 22, 2016Updated 9 years ago