tylert / pocorgtfo
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆183Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for pocorgtfo
- Medfusion 4000 security research & a MQX RCE.☆335Updated 6 years ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆253Updated 7 years ago
- RHme+ 2015 challenge☆106Updated 8 years ago
- random brain dumps☆347Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆285Updated 11 months ago
- scripts and examples for using JTAG debug tools to gain root access☆173Updated 8 years ago
- Radare2 cheat-sheet☆111Updated 6 years ago
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆71Updated 5 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆89Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆255Updated 9 months ago
- X41 Smartcard Fuzzer☆115Updated 5 years ago
- This repository contains a docker container dedicated to reverse engineering☆82Updated 6 years ago
- ☆278Updated 4 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- Published security vulnerabilities, research, and associated information.☆136Updated 4 years ago
- Radare Congress Stuff☆204Updated this week
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- RF retroreflectors☆99Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆58Updated 6 years ago
- An entropy generator using SDR peripherals, including rtl-sdr and BladeRF☆357Updated 3 years ago
- The USB host security assessment tool☆272Updated 5 years ago
- ☆138Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago