Nnubes256 / pwnobdView external linksLinks
Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.
☆29Sep 23, 2025Updated 4 months ago
Alternatives and similar repositories for pwnobd
Users that are interested in pwnobd are comparing it to the libraries listed below
Sorting:
- ☆25Sep 17, 2025Updated 4 months ago
- ☆15Aug 3, 2023Updated 2 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 10 months ago
- V2G evaluation tool☆23May 7, 2025Updated 9 months ago
- ☆18Aug 5, 2020Updated 5 years ago
- Read only mirror - No pull requests☆20May 7, 2021Updated 4 years ago
- A driver to implement IOCTL hooking☆27Mar 17, 2022Updated 3 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Tools and documentation to aid in modifying the ADI ADALM Pluto firmware☆36Nov 9, 2022Updated 3 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.☆31Jun 29, 2024Updated last year
- A python based Bot Net Framework☆43Aug 14, 2025Updated 5 months ago
- Java fuzz testing library for implementations of ABNF rules such as IETF RFCs☆34Sep 26, 2024Updated last year
- ☆32Jul 27, 2020Updated 5 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- A Linux persistence tool!☆159Sep 16, 2025Updated 4 months ago
- Blockchain Reader Library☆10Jan 20, 2024Updated 2 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- Fastest way to modify system wide DNS☆14Jun 10, 2025Updated 8 months ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆11Jul 4, 2018Updated 7 years ago
- ☆10Feb 11, 2025Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Mar 8, 2025Updated 11 months ago
- A Simple Kiosk application built using Flutter☆13Feb 28, 2022Updated 3 years ago
- ECP5 FPGA DEV BOARD☆10Apr 19, 2021Updated 4 years ago
- Linux tool for sniffing smartcard communication between card and reader using season interface.☆50Aug 18, 2024Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated last year
- pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具☆48Nov 14, 2024Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 3 years ago
- 123123☆16Dec 31, 2025Updated last month
- Python extension for the GNU project debugger (GDB)☆13Mar 6, 2020Updated 5 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- M-Visor is a virtualization framework that embeds a (Ring -2 layer) "SMM" inside the BIOS & WIndows. It uses CPU-native virtualization (I…☆25Dec 8, 2025Updated 2 months ago
- DOTS - Directed acyclic graph based Online Trajectory Simplification algorithm☆10Aug 7, 2018Updated 7 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago