smealum / butthaxLinks
lovense hush buttplug exploit chain
☆215Updated 6 years ago
Alternatives and similar repositories for butthax
Users that are interested in butthax are comparing it to the libraries listed below
Sorting:
- Placeholder repo 👀☆47Updated 4 years ago
- Some of my PoC stuff for the Nintendo Switch☆209Updated 8 years ago
- Program for extracting TLS keys from Oculus Runtime☆52Updated 5 years ago
- CVE‑2019‑5680☆103Updated 6 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆225Updated 4 years ago
- macOS Kernel Exploit for CVE-2019-8781.☆291Updated 5 years ago
- Debugging/emulating environment for Switch code☆159Updated 8 years ago
- ☆32Updated 5 years ago
- A fully implemented kernel exploit for the PS4 on 4.55FW☆241Updated 7 years ago
- Nyancat in the MBR☆122Updated 12 years ago
- DarkNight theme for Ghidra☆127Updated 4 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆295Updated 3 weeks ago
- XOR cat - a command line tool to XOR a data stream with a given key☆35Updated 12 years ago
- ARM Trusted Firmware-A for the Switch☆47Updated 7 years ago
- #CyberBarcode☆67Updated last year
- ☆37Updated 5 years ago
- coreboot for the Switch☆73Updated 7 years ago
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago
- ☆222Updated 5 years ago
- 3DS sys. settings sploit, <= 11.16☆113Updated 2 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Utility to glitch and dump an AirTag☆166Updated 4 years ago
- CLI tool to use the MSR605 magstripe reader/writer☆56Updated 11 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Visual reverse engineering tool.☆279Updated 8 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆152Updated 5 years ago