alainiamburg / PVEDLinks
Purposely Vulnerable Embedded Device
☆22Updated 8 years ago
Alternatives and similar repositories for PVED
Users that are interested in PVED are comparing it to the libraries listed below
Sorting:
- The USB host security assessment tool☆281Updated 6 years ago
- ☆106Updated 9 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆265Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- ☆137Updated 7 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- ☆111Updated 8 years ago
- ☆122Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆293Updated last year
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- ☆164Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- ☆71Updated 6 years ago
- Security advisories☆168Updated 9 years ago