CryptoMonkey / Conference-PresentationsLinks
☆10Updated 9 years ago
Alternatives and similar repositories for Conference-Presentations
Users that are interested in Conference-Presentations are comparing it to the libraries listed below
Sorting:
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Timing Sidechannel workshop☆30Updated 11 years ago
- ☆84Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago
- Hardware design files for the PMOD based MUX☆13Updated 6 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- utility for emulating a USB HID keyboard with the USBArmory☆44Updated 7 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 6 years ago
- ☆50Updated 3 weeks ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Conferences, tools, papers, etc.☆45Updated last week
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- SimBrush - SIM data carver and wrapper☆21Updated 13 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- Open Mesh OM5P-AC v2 Unlocker (U-Boot 1.1.4 based)☆36Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- HomePlugAV tools to test PLC (in)security☆49Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago