tylert / pocorgtfoLinks
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆185Updated last year
Alternatives and similar repositories for pocorgtfo
Users that are interested in pocorgtfo are comparing it to the libraries listed below
Sorting:
- Medfusion 4000 security research & a MQX RCE.☆339Updated 7 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆276Updated 5 years ago
- Files from my DEFCON CTF VM.☆271Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- random brain dumps☆350Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆294Updated last year
- Radare Congress Stuff☆215Updated this week
- ☆281Updated 5 years ago
- RHme+ 2015 challenge☆113Updated 9 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- Kinda useful notes collated together publicly☆497Updated 6 years ago
- Radare2 cheat-sheet☆113Updated 6 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 6 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- The USB host security assessment tool☆282Updated 6 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- ☆72Updated 6 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆271Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 8 years ago