ternus / nsaproductgenerator
NSA Product Generator!
☆43Updated 8 years ago
Related projects: ⓘ
- Twitter as an extra entropy source☆98Updated 6 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Updated 5 years ago
- scripts, etc...☆36Updated 7 months ago
- ☆48Updated last week
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 2 years ago
- Reading, writing and analysis of magnetic stripe information☆23Updated 13 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 6 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Generate CIA/NSA style project codenames☆23Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- A collection of crackmes☆39Updated 5 years ago
- U3 armory - exploiting the AutoRunz☆21Updated 7 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆32Updated 6 months ago
- PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP …☆26Updated 11 years ago
- Demo bootloaders - created just for fun☆21Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆26Updated 7 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 8 years ago
- Copy of the contents at phrack.com☆34Updated 3 weeks ago
- USB Attack Development Platform☆28Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 6 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆28Updated 4 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 5 years ago
- ☆76Updated 6 years ago
- Host files with DNS☆32Updated 8 years ago