canalyse / CANalyse-2.0View external linksLinks
A vehicle network analysis and attack tool.
☆19May 6, 2023Updated 2 years ago
Alternatives and similar repositories for CANalyse-2.0
Users that are interested in CANalyse-2.0 are comparing it to the libraries listed below
Sorting:
- ☆14Nov 9, 2022Updated 3 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Jan 31, 2026Updated 2 weeks ago
- ☆20Jan 7, 2021Updated 5 years ago
- ☆26May 11, 2025Updated 9 months ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 4 years ago
- runs rtlamr to read IDM/SCM power meter data and send to MQTT broker☆10Oct 13, 2021Updated 4 years ago
- Some collection of router firmware tools☆11Aug 4, 2020Updated 5 years ago
- 从http://ggjd.cnstock.com/ 抓取股票的午间公告☆10Aug 1, 2016Updated 9 years ago
- Firmware Tools framework☆10Aug 17, 2016Updated 9 years ago
- Real-time mesh fracturing with dynamic impact locations☆12Aug 27, 2020Updated 5 years ago
- Fusion is a minimal kernel utility designed for PlayStation 4 research and development.☆19Feb 6, 2026Updated last week
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- A tool that makes it easier to change Intel® CPU's Turbo Boost settings and clock speed.☆10Jul 8, 2021Updated 4 years ago
- Open source software radio 3GPP LTE UE☆10Apr 17, 2017Updated 8 years ago
- ☆13Jan 6, 2022Updated 4 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Python tools for reverse engineering Microsoft 3D Movie Maker☆12Feb 28, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- I just wanted to try to do it myself. No more updates for the moment as the firmware is now too big for the radio's memory.☆10Jan 15, 2024Updated 2 years ago
- ☆18Nov 7, 2024Updated last year
- B3-CoinV2☆11Nov 14, 2017Updated 8 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- A portable payload to decrypt PS5 SELF files from the filesystem to USB drive☆59Oct 13, 2023Updated 2 years ago
- Pollute phishing kits with fake credentials☆12Dec 17, 2021Updated 4 years ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 10 months ago
- The ultimate tool for data transfer, manipulation and proxy.☆16Jan 12, 2026Updated last month
- ☆11Jun 19, 2024Updated last year
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago
- This is a supervised Recurrent Neural Network (RNN) learning project treating stock trading as a classification problem. Given input of a…☆11Jul 19, 2020Updated 5 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- ☆12Apr 5, 2025Updated 10 months ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago