BlackVS / Awesome-CTS
A curated list of Capture The Signal CTF related stuff
☆14Updated 3 years ago
Alternatives and similar repositories for Awesome-CTS:
Users that are interested in Awesome-CTS are comparing it to the libraries listed below
- My writeups for some CTF I participated☆9Updated 3 years ago
- Content related to hardware hacking☆50Updated 6 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆25Updated 3 years ago
- Documentation for the Curious Bolt hardware hacking multi-tool☆11Updated last year
- Collection of scripts and how-to for hacking embedded devices☆22Updated last month
- Companion notebooks to the Hardware Hacking Handbook☆71Updated 3 years ago
- Client side tools to play the CTS contest☆46Updated 3 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆30Updated last year
- nanoMIPS module for Ghidra☆46Updated 4 months ago
- ☆45Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated last year
- A vehicle network analysis and attack tool.☆17Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆63Updated 5 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Files used for reproducing Fuzzware's experiments☆56Updated last year
- A tool for firmware cartography☆146Updated 3 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆32Updated 4 months ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆49Updated 4 years ago
- HN Security's advisories.☆22Updated 4 months ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆58Updated 2 years ago
- The official challenges and deployment source code files used in San Diego CTF 2022.☆27Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆33Updated 5 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 6 months ago
- ☆29Updated 2 years ago
- ☆46Updated 3 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆127Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago