tylert / pocorgtfo
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆184Updated 10 months ago
Alternatives and similar repositories for pocorgtfo:
Users that are interested in pocorgtfo are comparing it to the libraries listed below
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- Medfusion 4000 security research & a MQX RCE.☆335Updated 7 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Radare Congress Stuff☆208Updated 5 months ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- random brain dumps☆345Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆288Updated last year
- ☆137Updated 7 years ago
- a grep -r for secrets☆179Updated 2 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆56Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- ☆106Updated 9 years ago
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- ☆141Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Conference slides and White-papers☆356Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Teach you a binary exploitation for great good.☆293Updated 6 years ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆269Updated 7 years ago
- RHme+ 2015 challenge☆111Updated 8 years ago
- ☆162Updated 8 years ago
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- ☆280Updated 4 years ago
- Documentation for the Mechanical Phish.☆234Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 9 years ago