squeed / AppleRemoteSenderLinks
Simple library
☆47Updated 15 years ago
Alternatives and similar repositories for AppleRemoteSender
Users that are interested in AppleRemoteSender are comparing it to the libraries listed below
Sorting:
- ☆24Updated 4 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆40Updated 13 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 12 years ago
- stuff from my ToorCon 2015 talk☆14Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 11 years ago
- DNS TCP to UDP proxy☆10Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated this week
- A reverse engineered protocol description and accompanying code for Radioshack's 2200087 multimeter☆13Updated 8 years ago
- Simpe C tool to analyze x86 binary for used instructions set☆14Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 13 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- spy windows ce API calls☆11Updated 11 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- wow64 syscall filter☆13Updated 11 years ago
- Windows KExec☆25Updated 15 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 7 years ago
- Proof of Concept of HID26 Bruteforce☆29Updated 3 years ago
- ☆10Updated 10 years ago
- Windows Syslog Command Line Client☆15Updated 13 years ago
- Writing a 32-bit Protected Mode OS in NASM☆13Updated 13 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- ☆11Updated 2 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- AHA! badge designs☆17Updated 2 years ago
- repository with additional materials and source code☆32Updated 9 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 10 years ago
- Finds and display's your windows (XP, Vista, 7, 8, 8.1, 10) product key.☆16Updated 10 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Proof of concept exploit codes for vulnerabilities.☆11Updated 11 years ago