BrownFineSecurity / vstarcam-p2p-decrypt
VStarcam P2P Decryption Utility
☆39Updated 8 months ago
Alternatives and similar repositories for vstarcam-p2p-decrypt:
Users that are interested in vstarcam-p2p-decrypt are comparing it to the libraries listed below
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆137Updated last year
- ☆40Updated last year
- ☆16Updated 5 months ago
- Reverse engineering the TI AM3358 boot ROM☆52Updated 8 months ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆14Updated last week
- A simple USB sniffer based on Raspberry PI PICO RP2040 (pico-sdk)☆15Updated 3 months ago
- Apple Silicon to Apple Silicon VDM utility☆50Updated last year
- Raspberry Pi Pico voltage glitcher.☆27Updated 2 years ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆32Updated 5 months ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆26Updated 5 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆38Updated 3 months ago
- 2nd Generation of Multipurpose FTDI-based board for Hardware Hacking and IoT Security Testing☆29Updated last year
- Wiegand data logger, replay device and micro door-controller☆13Updated last year
- Python library to perform fault-injection attacks on microcontrollers☆89Updated this week
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆24Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆26Updated 3 years ago
- ☆47Updated 4 months ago
- A simple CUDA accelerated bruteforcer for KeeLoq algorithm☆39Updated last year
- iPhone 15 compatible firmware for the central scrutinizer.☆46Updated last year
- ☆12Updated last month
- ☆11Updated 3 months ago
- nard a dual sim/sam card interface for the flipper zero☆82Updated 4 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆27Updated last month
- Force target victim to unsafe network☆20Updated this week
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆58Updated 11 months ago
- Wear a 6th finger to make surveillance footage look like it's AI generated☆32Updated 8 months ago
- a set of scripts and tools for various firmware analysis tasks☆56Updated 3 weeks ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆127Updated this week
- A fault injection toolkit based on ESP8266 for glitching electronic circuits. It's low-cost, reliable and can be built anywhere.☆38Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆74Updated 6 months ago