6e726d / BHEU17
Black Hat 2017 - Wi-Fi Direct to Hell
☆13Updated 7 years ago
Alternatives and similar repositories for BHEU17:
Users that are interested in BHEU17 are comparing it to the libraries listed below
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- ☆20Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- a 802.11 wireless fuzzer☆91Updated 12 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 6 months ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- public exploits☆35Updated last year
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 7 months ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆35Updated 2 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Android Automation Tool☆21Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 7 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 9 years ago
- Automatically exported from code.google.com/p/wifuzz☆35Updated 9 years ago
- WhiteBox CMS analysis☆69Updated last year