Cognosec / SecBee
☆106Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for SecBee
- Penetration testing framework for ZigBee security research.☆108Updated 6 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆156Updated 6 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- NCC Group Open Source RF Security Testing Methodology☆89Updated 2 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆68Updated 3 years ago
- ☆117Updated 8 years ago
- scapy-radio (from original Hg repo)☆84Updated last year
- GUI Framework on top of Killerbee☆80Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆83Updated 6 years ago
- KeySniffer device discovery tools and public advisories☆112Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆121Updated 5 years ago
- Stargate☆94Updated 8 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆114Updated 6 years ago
- observation camera honeypot☆50Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆173Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 8 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- The USB host security assessment tool☆272Updated 5 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆207Updated 4 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Car Backdoor Maker☆215Updated 6 years ago