BlackVS / Awesome-CTS
A curated list of Capture The Signal CTF related stuff
☆14Updated 3 years ago
Alternatives and similar repositories for Awesome-CTS:
Users that are interested in Awesome-CTS are comparing it to the libraries listed below
- My writeups for some CTF I participated☆9Updated 3 years ago
- Client side tools to play the CTS contest☆46Updated 3 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆23Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆107Updated 10 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆29Updated last year
- Hands-on workshop on the basics of hardware hacking.☆116Updated last year
- Documentation for the Curious Bolt hardware hacking multi-tool☆10Updated 11 months ago
- Content related to hardware hacking☆47Updated 5 years ago
- ☆26Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆86Updated 2 years ago
- ☆18Updated 2 years ago
- ☆29Updated 2 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆60Updated 3 months ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 6 months ago
- Hack-a-Sat 4 2023 - Finals Public Release☆39Updated last year
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆45Updated 4 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Pwn2Win 2020 Challenges☆55Updated 3 years ago
- ☆32Updated last week
- ☆43Updated 3 years ago
- Set of pre-generated pwn.college challenges☆62Updated last year
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆107Updated 7 months ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆18Updated this week
- A vehicle network analysis and attack tool.☆17Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆46Updated last year
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆56Updated 2 years ago
- ☆20Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆124Updated 2 years ago
- ☆66Updated 3 months ago