0xADE1A1DE / USB-InjectionLinks
USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices
☆35Updated 8 months ago
Alternatives and similar repositories for USB-Injection
Users that are interested in USB-Injection are comparing it to the libraries listed below
Sorting:
- PoC code and tools for Black Hat USA 2024☆21Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆22Updated 11 months ago
- ASUS wifi router RCE vulnerability☆18Updated 10 months ago
- Research tools developed for Intel Wi-Fi chips☆55Updated last month
- Reverse Engineering and Observability toolkit for Draytek firewalls☆40Updated 5 months ago
- ☆37Updated 2 years ago
- Reverse engineering the TI AM3358 boot ROM☆53Updated 11 months ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆108Updated 2 months ago
- A repository with UEFI research stuff☆15Updated 2 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 5 months ago
- ☆10Updated last year
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆30Updated 4 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- USB testing made easy☆115Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆115Updated last year
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Updated 3 weeks ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 8 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- A MBR Fuzzer☆29Updated last year
- Scapy hands-on☆34Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- A collection of various exploits☆28Updated 10 months ago
- ☆41Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago