tylert / pocorgtfo
International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)
☆184Updated 11 months ago
Alternatives and similar repositories for pocorgtfo
Users that are interested in pocorgtfo are comparing it to the libraries listed below
Sorting:
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆274Updated 4 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 6 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- Medfusion 4000 security research & a MQX RCE.☆336Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- ☆280Updated 4 years ago
- KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.☆10Updated 7 years ago
- random brain dumps☆347Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆355Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Radare Congress Stuff☆207Updated 6 months ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆72Updated 6 years ago
- PoC || GTFO Issues☆68Updated 5 years ago
- ☆138Updated 3 years ago
- free crypto audit☆31Updated 8 years ago
- RHme+ 2015 challenge☆111Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆288Updated last year
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- Kudelski Security's 2017 crypto challenge☆20Updated 7 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago