skullspace / hacker-jeopardyLinks
☆27Updated 9 years ago
Alternatives and similar repositories for hacker-jeopardy
Users that are interested in hacker-jeopardy are comparing it to the libraries listed below
Sorting:
- Duct Tape Command and Control!☆96Updated 6 months ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 10 years ago
- ☆33Updated 11 years ago
- Extract Sense out of Gibberish stuff☆81Updated 8 years ago
- food food food☆241Updated 2 months ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Assesses CPU security of embedded devices. #nsacyber☆141Updated 9 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆36Updated 11 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Updated 5 years ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- ☆93Updated 7 years ago
- SIFT Bootstrap Script☆145Updated 8 years ago
- Stargate☆96Updated 9 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- Transparent network tap☆122Updated 10 years ago
- How I hacked mine..☆21Updated 6 years ago
- ☆49Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 9 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 9 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆299Updated 2 years ago
- ☆106Updated 10 years ago
- Scoreboard for Capture The Flag competitions.☆173Updated 3 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆72Updated 9 years ago