Damn Vulnerable Vehicle Application
☆76Dec 27, 2025Updated 2 months ago
Alternatives and similar repositories for DVVA
Users that are interested in DVVA are comparing it to the libraries listed below
Sorting:
- Minimal UART client in Golang that dumps LPC1343 chips that are locked at CRP1.☆20Feb 27, 2021Updated 5 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 9 months ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- Automotive Security Toolkit☆24Mar 1, 2026Updated last week
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- ☆13Sep 22, 2025Updated 5 months ago
- Linux Modules for IO Loopback☆11Jun 3, 2020Updated 5 years ago
- ☆11Jan 7, 2018Updated 8 years ago
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆20May 30, 2025Updated 9 months ago
- keyfob rx☆25Mar 30, 2011Updated 14 years ago
- ☆34Aug 20, 2025Updated 6 months ago
- ☆13Aug 15, 2016Updated 9 years ago
- Hackmelock Android application☆17Apr 11, 2017Updated 8 years ago
- 毕业设计 C-V2X漏洞挖掘 开放资源☆66Jun 15, 2022Updated 3 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23May 15, 2021Updated 4 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 6 months ago
- Simple Arduino project to detect RF jammers for a couple of bucks☆18Aug 1, 2019Updated 6 years ago
- ☆16Jul 23, 2018Updated 7 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- Remote Keyless Entry Systems☆18Mar 26, 2017Updated 8 years ago
- V2G evaluation tool☆23May 7, 2025Updated 10 months ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- ☆24Sep 23, 2023Updated 2 years ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 6 months ago
- Import CMSIS SVD files information onto your Ghidra memory map☆38Mar 2, 2026Updated last week
- ☆17Jun 14, 2023Updated 2 years ago
- ☆55Mar 28, 2023Updated 2 years ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆65Oct 25, 2024Updated last year
- OpenBTS 5.0 + Testcall☆18Jan 13, 2017Updated 9 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- 固件分析工具☆23Jan 7, 2025Updated last year
- 雪碧0xroot init3@0xroot.cn☆20Nov 1, 2019Updated 6 years ago