Damn Vulnerable Vehicle Application
☆77Dec 27, 2025Updated 3 months ago
Alternatives and similar repositories for DVVA
Users that are interested in DVVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 汽车信息安全事件时间轴☆91Mar 3, 2026Updated last month
- Entity-Relation Diagram Assisted Hacking Tool☆61Mar 7, 2026Updated last month
- Automotive Security Toolkit☆24Mar 1, 2026Updated last month
- Minimal UART client in Golang that dumps LPC1343 chips that are locked at CRP1.☆20Feb 27, 2021Updated 5 years ago
- iot-vuls☆24Mar 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- QNX and BB10 Security Tools☆167Mar 19, 2016Updated 10 years ago
- V2G evaluation tool☆23May 7, 2025Updated 11 months ago
- ☆34Aug 20, 2025Updated 7 months ago
- VSS Hardware Hacking Wiki and Blog Entries☆262Dec 14, 2023Updated 2 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- ☆55Mar 28, 2023Updated 3 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 4 years ago
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆22May 30, 2025Updated 10 months ago
- 毕业设计 C-V2X漏洞挖掘 开放资源☆68Jun 15, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Jul 9, 2017Updated 8 years ago
- A friendly car security exploration tool for the CAN bus☆895Aug 28, 2024Updated last year
- ☆11Jan 7, 2018Updated 8 years ago
- U-boot for GL MT300A GL MT300N-V2 and so on, which are based on MediaTek SoC.☆26Mar 23, 2020Updated 6 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆68Oct 25, 2024Updated last year
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- Command-line P25 decoder with liquid-dsp☆15Jul 4, 2025Updated 9 months ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Website for pid.codes☆13Apr 10, 2015Updated 11 years ago
- headless-ida-mcp-server☆41Apr 4, 2025Updated last year
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆273Sep 30, 2021Updated 4 years ago
- ☆356Oct 21, 2025Updated 5 months ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆346May 27, 2024Updated last year
- ☆17Jun 14, 2023Updated 2 years ago
- The server application for the NFCGate app☆117Apr 7, 2024Updated 2 years ago
- Internet of Vehicles Penetration testing OS.车联网渗透测试系统,开箱即用的测试环境,包含上百个常见用于车联网渗透测试的工具集。覆盖逆向、CAN、车载以太网、WiFi、蓝牙、云平台等安全测试☆316Dec 12, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Import CMSIS SVD files information onto your Ghidra memory map☆41Updated this week
- 雪碧0xroot init3@0xroot.cn☆20Nov 1, 2019Updated 6 years ago
- LLM-powered tool that enhances OpenAPI specifications by extracting machine-readable constraints from human-readable descriptions.☆14Nov 6, 2024Updated last year
- keyfob rx☆25Mar 30, 2011Updated 15 years ago
- It is a RESTful API fuzzer.☆12Jun 20, 2024Updated last year
- Collect some iot-related security articles, including vulnerability analysis, security conferences and papers, etc.☆303Jan 23, 2025Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 6 months ago