robertdavidgraham / applevfbi
A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus some commentary.
☆11Updated 9 years ago
Alternatives and similar repositories for applevfbi:
Users that are interested in applevfbi are comparing it to the libraries listed below
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- ☆15Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Network white noise collector☆19Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- ☆39Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- recon framework in ruby☆13Updated 13 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- Various pentest scripts☆13Updated 11 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago