CryptoMonkey / Conference-Presentations
☆10Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for Conference-Presentations
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆47Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆27Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆54Updated 6 years ago
- ☆15Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Timing Sidechannel workshop☆28Updated 10 years ago
- ☆20Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Updated 7 years ago
- ☆57Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆26Updated 7 years ago
- ZigBee hacking tools and scripts☆12Updated 6 years ago
- Small script to determine valid immediate values for ARM assembly☆17Updated 4 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆42Updated 3 years ago
- lte security☆41Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago