Chapoly1305 / nroottagLinks
Framework for abuse Apple Find My Network to perform unprivileged device tracking. Will present in USENIX Security '25 and DEFCON Demo Labs.
☆47Updated last week
Alternatives and similar repositories for nroottag
Users that are interested in nroottag are comparing it to the libraries listed below
Sorting:
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 8 months ago
- ☆40Updated 4 years ago
- exploits for CVE-2024-20017☆139Updated 11 months ago
- Force target victim to unsafe network☆26Updated 2 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆108Updated 2 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- Reverse engineering the TI AM3358 boot ROM☆53Updated 11 months ago
- A simple CUDA accelerated bruteforcer for KeeLoq algorithm☆39Updated last year
- Complete SMS packet manipulation☆113Updated 3 years ago
- A repository with UEFI research stuff☆15Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆21Updated last year
- ☆10Updated last year
- A collection of tools for security research on Starlink's User Terminal☆147Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆75Updated 9 months ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆30Updated 4 months ago
- Research tools developed for Intel Wi-Fi chips☆55Updated last month
- ☆14Updated 11 months ago
- ☆26Updated 2 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆79Updated 9 months ago
- Faulty Cat is a low-cost Electromagnetic Fault Injection (EMFI) tool, designed specifically for self-study and hobbiest research.☆83Updated this week
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆99Updated 3 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆78Updated 2 months ago
- random dissectors☆67Updated 2 years ago
- iTLB multihit PoC☆41Updated last year
- A tool that bypasses PN553 signature protection☆50Updated last year
- Tools for ESP32 firmware dissection☆39Updated last year
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆24Updated 5 months ago
- ☆10Updated 3 years ago