cromulencellc / hackasat-finals-2023Links
Hack-a-Sat 4 2023 - Finals Public Release
☆51Updated last year
Alternatives and similar repositories for hackasat-finals-2023
Users that are interested in hackasat-finals-2023 are comparing it to the libraries listed below
Sorting:
- Hack-A-Sat Qualifiers Writeups☆254Updated 2 years ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- ☆30Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year
- A collection of tools for security research on Starlink's User Terminal☆147Updated last year
- ☆123Updated last year
- A full-featured open-source Wi-Fi fuzzer☆192Updated last month
- ☆101Updated 7 months ago
- ☆204Updated 9 months ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- Write ups for Ph0wn CTF☆43Updated 7 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆237Updated 3 months ago
- ☆99Updated 6 months ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆91Updated 2 years ago
- Open source release of challenges and other code used in the Hack-A-Sat Qualifier in 2020.☆86Updated last year
- CVE-2023-4911 proof of concept☆168Updated last year
- A curated list of hardware-oriented CTF challenges.☆39Updated 9 months ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆108Updated 2 months ago
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆275Updated this week
- Bluetooth Security Assessment Methodology☆132Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆74Updated 2 weeks ago
- ☆46Updated last week
- Wireless Hacking Devices Protocol client☆216Updated this week
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆206Updated last month
- exploits for CVE-2024-20017☆139Updated 11 months ago
- CVEs and Techniques used PDF as an attack vector.☆93Updated 3 years ago