domienschepers / asiaccs-discovering-logical-vulnerabilitiesLinks
Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".
☆13Updated 7 years ago
Alternatives and similar repositories for asiaccs-discovering-logical-vulnerabilities
Users that are interested in asiaccs-discovering-logical-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Frida FDE bruteforce Samsung S7 Edge☆49Updated 6 years ago
- BlueRepli-Plus☆18Updated 5 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 4 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 9 months ago
- ☆33Updated 2 weeks ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆32Updated 6 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆158Updated 4 years ago
- Hexagon processor module for IDA Pro disassembler☆19Updated 3 years ago
- ☆17Updated 7 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- A Tamarin model and analysis of EMV☆36Updated 4 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- ☆23Updated 8 years ago
- ☆96Updated 5 years ago
- Network and USB protocol fuzzing toolkit.☆69Updated 7 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- ☆172Updated 5 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 5 months ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- A smali emulator.☆25Updated 7 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆46Updated 4 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Updated 6 years ago
- cve-2019-11931☆35Updated 6 years ago