Chapoly1305 / nroottagLinks
Framework for abuse Apple Find My Network to perform unprivileged device tracking. USENIX Security '25 and DEFCON Demo Labs.
☆59Updated 4 months ago
Alternatives and similar repositories for nroottag
Users that are interested in nroottag are comparing it to the libraries listed below
Sorting:
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated last year
- Tools for ESP32 firmware dissection☆56Updated 3 months ago
- exploits for CVE-2024-20017☆140Updated last year
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- ASUS wifi router RCE vulnerability☆18Updated 2 months ago
- Reverse engineering the TI AM3358 boot ROM☆59Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆96Updated 2 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ☆11Updated last year
- ☆26Updated 2 years ago
- ☆41Updated 4 years ago
- ☆44Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆28Updated 3 months ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆110Updated 7 months ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated this week
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- ☆16Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Updated 2 years ago
- JFFS2 filesystem extraction tool☆83Updated 3 weeks ago
- BINARLY Research Tools and PoCs☆39Updated last year
- ☆16Updated last year
- DJI Drone Control Hijacking☆38Updated 2 years ago
- VStarcam P2P Decryption Utility☆48Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆33Updated last week
- Tools for ESP32 firmware dissection☆65Updated last year
- iTLB multihit PoC☆42Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆28Updated 4 years ago
- Vulnerabilities advisories and PoC☆18Updated last month
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆84Updated last year