ternus / nsaproductgeneratorLinks
NSA Product Generator!
☆47Updated 9 years ago
Alternatives and similar repositories for nsaproductgenerator
Users that are interested in nsaproductgenerator are comparing it to the libraries listed below
Sorting:
- Architectural privilege escalation on x86☆61Updated 7 years ago
- A collection of Hack The Planet's zines.☆72Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆212Updated 9 months ago
- Binary Protocol Differ☆117Updated 5 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- ☆29Updated 6 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- ☆63Updated 9 years ago
- ☆84Updated 7 years ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- Generate CIA/NSA style project codenames☆21Updated 8 years ago
- repository with additional materials and source code☆32Updated 9 years ago
- The source code to my defuse.ca website.☆73Updated 3 weeks ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- scripts, etc...☆37Updated last year
- Open Source Rootkit☆22Updated 8 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆74Updated 8 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- An ELF parasite command injector.☆34Updated 8 years ago
- Files compiled from the Logica breach investigation materials☆45Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago