Automated CAN Analyzer
☆15Dec 3, 2019Updated 6 years ago
Alternatives and similar repositories for ACA
Users that are interested in ACA are comparing it to the libraries listed below
Sorting:
- ☆17Jun 30, 2023Updated 2 years ago
- ReCAN Source - Reverse engineering of Controller Area Networks - In collaboration with the Politecnico di Milano, Italy☆46May 3, 2020Updated 5 years ago
- Hackmelock emulator device using node.js bleno☆27Sep 21, 2017Updated 8 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- ☆27Aug 10, 2023Updated 2 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- We implement MADDPG in a congestion env, and compare with several control groups to highlight the performance of MADDPG☆10Jul 14, 2021Updated 4 years ago
- Computer Vision Models☆12Mar 1, 2023Updated 3 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Find strongest response of convolutional layers on an image dataset. Automatically compute receptive field for any CNN layer.☆14Feb 19, 2021Updated 5 years ago
- Repo for machine learning research paper summaries☆10Jun 26, 2018Updated 7 years ago
- QNAP NAS firmware encryption/decryption tool☆11Sep 5, 2020Updated 5 years ago
- ☆13May 5, 2018Updated 7 years ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆15Jun 26, 2022Updated 3 years ago
- ROMFS文件系统固件解析与提取☆12Dec 24, 2023Updated 2 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- [MIRROR] OpenWrt firmware image utilities☆16Feb 13, 2026Updated 2 weeks ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- ResearchDoom fork of the Chocolate Doom engine.☆16Oct 20, 2017Updated 8 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- Explanation of Mathematics used in Machine Learning Algorithms and some Projects☆14Jul 19, 2018Updated 7 years ago
- Vulnerability management tool that provides Buildroot SBOM generation and CVE Analysis of target images.☆11Jan 2, 2026Updated last month
- Tools for ESP32 firmware dissection☆61Jan 20, 2026Updated last month
- ☆42Jul 22, 2023Updated 2 years ago
- ☆10Jun 11, 2018Updated 7 years ago
- This is the code-base that I personally use as the starting point for any reinforcement learning codebase with the purpose of fast experi…☆13Jan 4, 2023Updated 3 years ago
- Pure Scheme Gopher Server☆11Jan 21, 2012Updated 14 years ago
- ☆16Aug 14, 2024Updated last year
- ☆12Aug 10, 2019Updated 6 years ago
- Tesla Model 3 premium amp reverse engineering☆12May 8, 2023Updated 2 years ago
- A comparison of RCN/CNN/SVM/KNN on EMNIST-letters dataset☆10Dec 18, 2017Updated 8 years ago
- ☆16Oct 28, 2020Updated 5 years ago
- Multi-Agent Reinforcement Learning☆11Jun 16, 2020Updated 5 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Nov 26, 2025Updated 3 months ago
- A collection of Ghidra scripts and tools to improve UEFI Binary Analysis and automation☆12Jun 25, 2024Updated last year
- A Towers of Hanoi environment in OpenAI Gym Style☆14Jun 6, 2019Updated 6 years ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago