Exploits for TRENDNet routers
☆13Apr 21, 2020Updated 5 years ago
Alternatives and similar repositories for TRENDNetExploits
Users that are interested in TRENDNetExploits are comparing it to the libraries listed below
Sorting:
- FuzzCoAP - Fuzzing for Robustness and Security Testing of CoAP Servers☆12Jun 23, 2018Updated 7 years ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 5 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- ☆18Mar 18, 2024Updated 2 years ago
- A free implementation of DCE RPC, with development aimed at implementing DCOM for Linux (and other UNIX systems).☆10Sep 5, 2013Updated 12 years ago
- 9P kernel modules☆10Aug 25, 2014Updated 11 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Aug 9, 2018Updated 7 years ago
- ☆19Apr 6, 2024Updated last year
- Support for root over network block device☆12Aug 3, 2016Updated 9 years ago
- Bruce's new cron system☆15Apr 28, 2021Updated 4 years ago
- A secure utmp/wtmp implementation☆19Jan 21, 2026Updated last month
- FreeSynd is a cross-platform, GPLed reimplementation of engine for the classic Bullfrog game, Syndicate.☆13Jun 9, 2015Updated 10 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- A PAM wrapper for encapsulation of dynamic module loading☆16Jan 21, 2026Updated last month
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- Intelligence Defined Networking☆13Dec 6, 2017Updated 8 years ago
- ☆16Jan 14, 2026Updated 2 months ago
- ☆18Jun 29, 2022Updated 3 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- IDA PRO signature files that can be used in reversing the iPhone baseband. On an iPhone 4 firmware can pickup upto 800 functions when al…☆27May 15, 2012Updated 13 years ago
- The pam_ldap module provides the means for Solaris and Linux servers and workstations to authenticate against LDAP directories, and to ch…☆14Jul 1, 2024Updated last year
- Reverse engineering tool using bioinformatics sequence alignment algorithms☆26Mar 5, 2021Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- The code for an FPGA softcore comparison☆11Jun 21, 2020Updated 5 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- A superfast C compiler inspired by TinyCC☆16May 27, 2015Updated 10 years ago
- A static deobfuscator for JavaScript Malware☆13May 6, 2020Updated 5 years ago
- A tool that helps with analysis of obfuscated JavaScript☆11Dec 15, 2023Updated 2 years ago
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆43Aug 28, 2022Updated 3 years ago
- "When one door of happiness closes, another opens; but often we look so long at the closed door that we do not see the one which has been…☆17Aug 17, 2021Updated 4 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- Parse OCR result files for pagenos, tables of contents, etc.☆14Nov 30, 2011Updated 14 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- legacy MTK devices preLoader from Mediatek☆20Apr 29, 2024Updated last year
- Python table tennis 2D game with network multiplayer support using tcp sockets☆14Nov 3, 2020Updated 5 years ago
- My Emacs configuration☆11Oct 12, 2021Updated 4 years ago
- Tooling to use the Pynq Board somewhat nicely☆13Dec 5, 2022Updated 3 years ago