CryptoMonkey / Conference-PresentationsLinks
☆10Updated 9 years ago
Alternatives and similar repositories for Conference-Presentations
Users that are interested in Conference-Presentations are comparing it to the libraries listed below
Sorting:
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Hardware design files for the PMOD based MUX☆13Updated 6 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- ☆83Updated 7 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated last year
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆57Updated 11 years ago
- ☆36Updated 9 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆86Updated 11 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆81Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆28Updated last year
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 12 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 11 years ago
- HomePlugAV tools to test PLC (in)security☆49Updated 6 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- The BUSSide Badge☆48Updated 3 years ago
- Conferences, tools, papers, etc.☆43Updated 2 months ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆48Updated 5 years ago