-
Mars Cybersecurity Bureau
- Utopia Planitia
- https://h4cker.zip/
Lists (13)
Sort Name ascending (A-Z)
Starred repositories
自动化的 Python 沙箱逃逸 payload bypass 框架 / Automated Python Sandbox Escape Payload Bypass Framework
Apache RocketMQ Arbitrary File Write Vulnerability Exploit
Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit
Adobe Block Hosts List to block Adobe activation.
CAN of Fingers (c0f) creates passive fingerprints of Make and Model over CAN bus
The premier source of truth powering network automation. Open source under Apache 2. Try NetBox Cloud free: https://netboxlabs.com/products/free-netbox-cloud/
PASTA: Portable Automotive Security Testbed with Adaptability
RAMN (Resistant Automotive Miniature Network), a miniature CAN/CAN-FD testbed of 4 Electronic Control Units.
Slides for my Offzone_2025 presentation. How bypass "Read protection", "ID authentication" & extract RH850 MCU's bootrom.
Install and Configure Common Car Hacking Tools.
Security analysis toolkit for proprietary car protocols
🚗 A curated list of resources for learning about vehicle security and car hacking.
A friendly car security exploration tool for the CAN bus
MCP configuration to connect AI agent to a Linux machine.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。支持MCP接入
最好用最智能最可控的目录Fuzz工具 | The most powerful, user-friendly, intelligent, and precise HTTP Fuzzer.
清理Augment缓存和生成设备SessionId/解决 VSCode、Cursor、JetBrains 系列 IDE 中 Augment 插件无法登录的问题(Sign in failed. If you have a firewall, please add)/将所有 d1-d20.api.augmentcode.com 域名统一指向延迟最低的服务器IP
decrypting winrm traffic using password/ntlm hash, repo fork from https://gist.github.com/jborean93/d6ff5e87f8a9f5cb215cd49826523045/