smealum / butthaxView external linksLinks
lovense hush buttplug exploit chain
☆220Aug 14, 2019Updated 6 years ago
Alternatives and similar repositories for butthax
Users that are interested in butthax are comparing it to the libraries listed below
Sorting:
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- PoC save decrypting+resigning for Animal Crossing: New Horizon (1.2.0 updated)☆23Apr 23, 2020Updated 5 years ago
- Homebrew exploit for 3.0.0 (source code, historical purposes)☆65Apr 25, 2018Updated 7 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆20Jan 16, 2019Updated 7 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Jul 29, 2018Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆278Nov 3, 2019Updated 6 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- source code for 3DS hax 2.x payloads☆79Feb 17, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.☆207Mar 8, 2019Updated 6 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- CSPSP port for 3DS☆16Apr 22, 2016Updated 9 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Bowser's Fury Online Multiplayer☆22May 11, 2025Updated 9 months ago
- ☆19Dec 20, 2019Updated 6 years ago
- Binary Ninja loader for common Nintendo Switch file types☆20Dec 11, 2023Updated 2 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆57Mar 5, 2023Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- ☆26Nov 5, 2016Updated 9 years ago