tomasz-lisowski / simurai-usenixsec2024-aeLinks
☆17Updated 8 months ago
Alternatives and similar repositories for simurai-usenixsec2024-ae
Users that are interested in simurai-usenixsec2024-ae are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- A repository with UEFI research stuff☆15Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated last month
- ☆24Updated 2 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Rubber Ducky powered by NeoKey☆25Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆50Updated 5 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- ☆8Updated last year
- Force target victim to unsafe network☆26Updated last month
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Single-Clich-Proxy-Chains☆10Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- ☆14Updated 11 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆60Updated 8 months ago
- GitHub CVE Repository Hunt☆18Updated 11 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 3 months ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 7 months ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆16Updated 11 months ago
- ☆18Updated 3 years ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆74Updated 8 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago