VehicleCyberSec / CarValLinks
☆26Updated 2 years ago
Alternatives and similar repositories for CarVal
Users that are interested in CarVal are comparing it to the libraries listed below
Sorting:
- Automated CAN Analyzer☆15Updated 6 years ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- A state-aware defense framework against vehicular message injection attacks.☆35Updated 4 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- FirmSec Dataset☆43Updated 2 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆48Updated 7 months ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆364Updated 5 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated 2 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- A fuzzer for the CAN bus☆17Updated 9 months ago
- ☆60Updated last year
- 一个can总线模糊测试小工具☆20Updated 3 years ago
- Autosuite:an open source multi-protocol low-cost vehicle bus testing framework☆41Updated 2 years ago
- Fuzzing the COVESA/vsomeip library with AFL++☆21Updated 3 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆17Updated 9 months ago
- ☆14Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- ☆20Updated last year
- ☆18Updated 2 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆56Updated last year
- Recent security papers on firmware analysis☆76Updated 4 years ago
- ☆28Updated last year
- 毕业设计 C-V2X漏洞挖掘 开放资源☆66Updated 3 years ago
- ☆22Updated last year
- List of (automatic) protocol reverse engineering tools for network protocols☆179Updated last year
- ☆16Updated last year
- An app to complete man in the middle attack with Tesla Model 3☆69Updated 4 months ago
- L2Fuzz Source Code☆42Updated 2 years ago