BrownFineSecurity / vstarcam-p2p-decryptLinks
VStarcam P2P Decryption Utility
☆48Updated last year
Alternatives and similar repositories for vstarcam-p2p-decrypt
Users that are interested in vstarcam-p2p-decrypt are comparing it to the libraries listed below
Sorting:
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆151Updated 2 years ago
- ☆11Updated last year
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆34Updated 3 weeks ago
- Reverse engineering the TI AM3358 boot ROM☆59Updated last year
- JFFS2 filesystem extraction tool☆82Updated 2 weeks ago
- Tools for ESP32 firmware dissection☆65Updated last year
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated last year
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆260Updated 3 weeks ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆83Updated last year
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆28Updated 4 years ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆141Updated 2 weeks ago
- ☆131Updated 2 years ago
- ☆44Updated last year
- ☆53Updated 8 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆84Updated last year
- iPhone 15 compatible firmware for the central scrutinizer.☆48Updated 2 years ago
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆45Updated 4 months ago
- BLE pentesting scripts☆113Updated 2 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆222Updated 2 years ago
- Framework for abuse Apple Find My Network to perform unprivileged device tracking. USENIX Security '25 and DEFCON Demo Labs.☆59Updated 4 months ago
- A sniffer for Bluetooth 5 and 4.x LE☆106Updated 2 months ago
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- ☆17Updated last year
- ☆97Updated 3 years ago
- Tools for ESP32 firmware dissection☆56Updated 3 months ago
- WHAD-enabled firmware for nRF52840 dongle, allowing to sniff and inject packets from multiple wireless protocols (e.g. BLE, Zigbee, Enha…☆40Updated 2 months ago
- ☆59Updated 2 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆165Updated 3 months ago
- uses the atom gps kit to wardrive and give status via the leds☆27Updated last year
- Toolkit for assessing LoRaWAN network security☆26Updated 3 months ago