alainiamburg / PVED
Purposely Vulnerable Embedded Device
☆21Updated 7 years ago
Related projects: ⓘ
- Writeups for the RHME2 CTF☆11Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- A GUI-based USB device fuzzer☆60Updated 6 years ago
- ☆83Updated this week
- Shikra (http://int3.cc/products/the-shikra) programming utility☆42Updated 3 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated last month
- Vulnerability research and development.☆25Updated 9 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 9 years ago
- Timing Sidechannel workshop☆28Updated 10 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- The Zulu fuzzer☆125Updated 6 years ago
- Proof-of-Concept code for exploits☆82Updated 8 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆16Updated 6 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 8 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 8 years ago
- ☆138Updated 6 years ago
- ☆26Updated 8 years ago
- a 802.11 wireless fuzzer☆85Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- ☆18Updated this week
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆48Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆63Updated 9 years ago
- All related files and slides for past talks☆44Updated last year