Chapoly1305 / nroottagLinks
Framework for abuse Apple Find My Network to perform unprivileged device tracking. USENIX Security '25 and DEFCON Demo Labs.
☆60Updated 5 months ago
Alternatives and similar repositories for nroottag
Users that are interested in nroottag are comparing it to the libraries listed below
Sorting:
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆37Updated last year
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆110Updated 8 months ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- exploits for CVE-2024-20017☆140Updated last year
- ☆16Updated last year
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆268Updated 2 weeks ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆104Updated 3 years ago
- Reverse engineering the TI AM3358 boot ROM☆59Updated last year
- A collection of tools for security research on Starlink's User Terminal☆157Updated 2 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆97Updated 2 months ago
- ☆41Updated 4 years ago
- ☆11Updated last year
- Force target victim to unsafe network☆29Updated 7 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Tools for ESP32 firmware dissection☆57Updated last week
- OpenBTS-UMTS reloaded 2024. Compatibility with latest UHD drivers, several fixes and updated install documentation for Ubuntu 22.04☆60Updated last year
- A tool that bypasses PN553 signature protection☆50Updated 2 years ago
- random dissectors☆68Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆29Updated 4 years ago
- ☆27Updated 2 years ago
- ☆16Updated last year
- ☆44Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Updated 4 months ago
- DJI Drone Control Hijacking☆41Updated 2 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆135Updated last year
- ☆21Updated 7 months ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆34Updated 4 months ago
- ☆97Updated last year
- iTLB multihit PoC☆42Updated 2 years ago