ternus / nsaproductgeneratorLinks
NSA Product Generator!
☆45Updated 9 years ago
Alternatives and similar repositories for nsaproductgenerator
Users that are interested in nsaproductgenerator are comparing it to the libraries listed below
Sorting:
- Architectural privilege escalation on x86☆60Updated 7 years ago
- A collection of Hack The Planet's zines.☆71Updated 9 years ago
- ☆83Updated 7 years ago
- ARM is Turing-complete without data fetches☆57Updated 7 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- ☆29Updated 6 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 8 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆74Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆199Updated 4 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆90Updated last year
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆135Updated 9 years ago
- Airprobe for frequency hopping GSM channels☆30Updated 11 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- The source code to my defuse.ca website.☆70Updated last month
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- ☆92Updated 7 years ago
- scripts, etc...☆37Updated last year
- ☆48Updated 2 weeks ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- PEI stage backdoor for UEFI compatible firmware☆224Updated 4 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago