PiCCANTE is a powerful tool for exploring and reversing CAN busses of vehicles, based on Raspberry Pi Pico (any model)
☆65Jan 26, 2026Updated last month
Alternatives and similar repositories for PiCCANTE
Users that are interested in PiCCANTE are comparing it to the libraries listed below
Sorting:
- Awesome MalDev Links☆41Mar 2, 2026Updated last week
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆37Aug 5, 2025Updated 7 months ago
- ☆27Nov 7, 2023Updated 2 years ago
- A parser for Microsoft PDB (Program Database) debugging information☆23Nov 5, 2024Updated last year
- ForsHops☆59Mar 25, 2025Updated 11 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- A Rust library for parsing and writing MS Shell Links (shortcuts, *.lnk)☆32Sep 2, 2025Updated 6 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 5 months ago
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year
- ☆10Oct 20, 2021Updated 4 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Sep 22, 2025Updated 5 months ago
- Collection of scripts and CMake files to easily link to LLVM into your project (Windows, Linux, macOS).☆43Apr 2, 2025Updated 11 months ago
- CAN BUS Man In The Middle for spying on and modifyling automotive can traffic on the fly.☆38Mar 21, 2020Updated 5 years ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 8 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆15Oct 27, 2025Updated 4 months ago
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated 2 weeks ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆111Jan 18, 2026Updated last month
- Python code to interface a Raspberry Pi 4 with a Bluetooth OBD II Adapter to retrieve data, displaying those values onto a GUI using pyga…☆12Dec 26, 2023Updated 2 years ago
- Arsenal of modules to beacon postex☆94Updated this week
- A ROM for the DEF CON 32 (2024) badge that makes all the lights flash☆35Aug 17, 2024Updated last year
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Jan 3, 2026Updated 2 months ago
- ☆17Dec 4, 2025Updated 3 months ago
- A SLEIGH processor spec for Ghidra for the Motorola 68HC11 (HC11) microcontroller family.☆20Sep 10, 2024Updated last year
- eMMC / SD Card testing library☆10Jul 2, 2025Updated 8 months ago
- ☆10Dec 1, 2022Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago