There are no reviews yet. Be the first to send feedback to the community and the maintainers!
hacking-gemtek
hacking-gemtek is a reverse engineering project for a Gemtek home router (WVRTM-127ACN), distributed in Italy by Linkem, with the purpose to modify the firmware, gain root access, recover default WiFi password. It includes an emulation environment based on Qemu and Docker, a firmware modification kit and a default WiFi password generator. The project follows the reverse engineering process described by the author in a talk at Hack In Paris 2019.gns3-large
GNS3 dockerfile with VPCS, IOU support, QEMU and Wiresharkbuildroot-armv7
A set of scripts, configuration files and Buildroot external tree to setup a Qemu emulation environment to run and reverse engineer the *Netgear DVA 5592* executables. This environment uses Docker, Buildroot and Qemu to emulate a board with an ARMv7 Cortex A9 processor, Linux kernel 3.4.11-rt19, uClibc 0.9.33.2, and old versions of other libraries.esp8266-rs41
ESP8266 Wemos D1 to setup the Radiosonde RS41 at startup. It will modify the TX registers 75, 76, and 77 to select an arbitrary frequency, usually inside the radio amateur bandhht
HHT stands for "Hardware Hacking Tutorial" and contains the companion code to the Hardware Hacking Tutorial series on YouTube: Debian Wheezy based Docker container, to run an old Buildroot version, scripts and external tree to generate a MIPSel image with Buildroot, scripts to run QEMU on this image.hash-capture
Automatically scans nearby WiFi networks, de-authenticates clients and tries to capture the four way handshake that can be later used to offline crack passwords with hashcat or aircrack-ng.arduino-makefile
A simple Makefile to compile and upload Arduino sketches using a command-line based workflow. It includes Over The Air updates for WiFi-enabled boards and uses the "arduino-cli" command line interface.lzma-uncramfs
lzma-uncramfs is a modification of the uncramfs program to be able to unpack cramfs images included in some openrg based home routers. It includes lzma decompression and a different PAGE_CACHE_SIZE.alice-wpa-tools
hacktivity-2019-esp32-hello-world
A bit more than an "Hello World" for the Hacktivity 2019 badge with modified SAMD21 firmware to use it in the Arduino environmentarduino-manifest
Reads Arduino source files and print a list of used libraries and their versions.Love Open Source and this site? Check out how you can help us