tylert / pocorgtfoLinks
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆185Updated last year
Alternatives and similar repositories for pocorgtfo
Users that are interested in pocorgtfo are comparing it to the libraries listed below
Sorting:
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Kinda useful notes collated together publicly☆496Updated 6 years ago
- Database of private SSL/SSH keys for embedded devices☆264Updated last year
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- This repository contains a docker container dedicated to reverse engineering☆85Updated 6 years ago
- Files from my DEFCON CTF VM.☆269Updated 8 years ago
- random brain dumps☆348Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆290Updated last year
- Private keys that have become public ...☆180Updated 3 months ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- ☆280Updated 5 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Radare Congress Stuff☆212Updated 8 months ago
- Linux bind shell with anti-reverse engineering techniques☆288Updated 8 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 4 years ago
- CableTap public disclosure documents.☆79Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆335Updated 7 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 10 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- Radare2 cheat-sheet☆113Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- ☆138Updated 7 years ago
- ☆144Updated 8 years ago