CNK2100 / VFuzz-public
☆13Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for VFuzz-public
- BusKill kill cord for Linux☆31Updated 4 years ago
- ☆27Updated 3 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆22Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 4 years ago
- A bash script to automate Toyota tire pressure monitoring system testing via rtl_433.☆21Updated 2 years ago
- ☆11Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆13Updated 2 years ago
- Readline is a pure go(golang) implementation for GNU-Readline kind library☆13Updated 3 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Tools for ESP32 firmware dissection☆30Updated 9 months ago
- Tools for ESP32 firmware dissection☆32Updated 6 months ago
- Seer is a tool that recognizes the architecture of a binary file☆101Updated 2 years ago
- FPGA glitcher based on toothlessco's arty-glitcher, but for the icebreaker☆16Updated 4 years ago
- Telethon inspired chatbot class for LXMF protocol☆12Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆26Updated 5 months ago
- A collection of random 802.11 tools☆11Updated 8 months ago
- Some stuff about telecom security☆14Updated 8 years ago
- Data graphing library for command line.☆15Updated 3 years ago
- CveXplore☆33Updated 3 months ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆23Updated 10 months ago
- Simple program for extracting data from UM25C bluetooth power meter and for generating real-time voltage, current and power graphs☆13Updated 3 years ago
- Checks for tpm vulnerabilities☆36Updated last year
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆11Updated 3 weeks ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- A tool to help you understand TPM commands and responses.☆34Updated 2 months ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆16Updated 2 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago
- Linux crash harness with runtime process instrumentation☆22Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago