P1kachu / awesome-vehicle-securityView external linksLinks
🚗 A curated list of resources for learning about vehicle security and car hacking.
☆64Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for awesome-vehicle-security
Users that are interested in awesome-vehicle-security are comparing it to the libraries listed below
Sorting:
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit☆19Oct 14, 2024Updated last year
- ☆14Sep 26, 2021Updated 4 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- Burp Suite Extension to monitor new scope☆17Mar 31, 2021Updated 4 years ago
- Firmware Update for Electric Liftgate Systems (Tesla Model S/X/3/Y) from EVOffer☆23Mar 12, 2025Updated 11 months ago
- Instrument Cluster Simulator☆930Sep 18, 2025Updated 4 months ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- kilroy☆39Jun 23, 2014Updated 11 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆25Oct 20, 2022Updated 3 years ago
- Firmware signature bypass on the IC204☆27Dec 31, 2021Updated 4 years ago
- Arduino code for use with nano can PCB☆96Feb 6, 2026Updated last week
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- For my Try Hack Me room: Intro To Pwntools☆33Jun 10, 2021Updated 4 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- 泛物联网安全☆24Dec 27, 2025Updated last month
- ☆31Feb 20, 2022Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Aug 11, 2023Updated 2 years ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- ☆28Aug 6, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Jan 16, 2026Updated 3 weeks ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- ☆31Oct 13, 2025Updated 4 months ago
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Aug 13, 2022Updated 3 years ago
- ☆27Feb 15, 2022Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- Some tools for reversing QDSP hexagon☆41Dec 25, 2020Updated 5 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Nov 14, 2022Updated 3 years ago
- send messages via kwp2000 protocol using Arduino☆11Aug 12, 2022Updated 3 years ago
- Image Warping for Inverse Problems☆11Nov 30, 2023Updated 2 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking.☆4,108Dec 30, 2024Updated last year
- QT based cross platform canbus tool☆1,501Jan 14, 2026Updated last month
- This is a RF signal encode and decode library that can be adapted to different protocols by specifying the timing conditions is a table. …☆41Apr 26, 2023Updated 2 years ago
- Brutally optimizing guess-and-determine attacks https://www.usenix.org/conference/woot18/presentation/verstegen☆45Aug 13, 2018Updated 7 years ago
- Raspberry Pi-based headless Plexamp player inside a vintage cassette deck☆16Jan 4, 2026Updated last month