☆41Apr 4, 2021Updated 4 years ago
Alternatives and similar repositories for IOTToolkit
Users that are interested in IOTToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 16, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Slides for eMMC Hacking 2017☆16Apr 27, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Miscellaneous Experiments with LoRa☆12Sep 16, 2016Updated 9 years ago
- 自动采集代理IP池工具☆17May 30, 2022Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Bridge between Tetra DMO Repeater (Motorola MTM5400) and Brandmeister DMR Network☆14Jan 19, 2022Updated 4 years ago
- a set of scripts and tools for various firmware analysis tasks☆81Apr 4, 2025Updated 11 months ago
- Bash script that backs up Docker images or containers, and then scans them using VirusTotal.☆16May 2, 2023Updated 2 years ago
- crc patcher for kernel modules☆12Apr 15, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- ☆119Jun 17, 2021Updated 4 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Automatically parse and tabulate Nessus findings into OpenDocument tables☆11Dec 15, 2015Updated 10 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 🤖 A homebridge plugin to control your xiaomi mi robot vacuum☆10May 14, 2017Updated 8 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- EDL mode downloaded for Samsung A505FN based on smdk-tools-v0.20☆20Jun 16, 2020Updated 5 years ago
- ☆26Apr 24, 2025Updated 11 months ago
- ☆12Feb 17, 2017Updated 9 years ago
- ☆10Jan 2, 2017Updated 9 years ago
- Every device has a limit on the size of the L2CAP ping. If it gets an L2CAP ping packet, which is beyond the limit of the size, it will c…☆23Jan 25, 2026Updated 2 months ago
- Various Plater configs for Voron printers. Use as your own risk and remember to update your STL folders!☆11Jan 28, 2021Updated 5 years ago
- Scripts to assist with the creation of a raspberry pi kubernetes cluster.☆15Jun 12, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆62Aug 31, 2022Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Unofficial documentation/wiki of the EE branded Alcatel HH70VB router (4GEE Home Router)☆15Aug 16, 2021Updated 4 years ago