efchatz / WPAxFuzzLinks
A full-featured open-source Wi-Fi fuzzer
☆197Updated 3 months ago
Alternatives and similar repositories for WPAxFuzz
Users that are interested in WPAxFuzz are comparing it to the libraries listed below
Sorting:
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆248Updated 9 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆125Updated 2 months ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆341Updated last year
- L2Fuzz Source Code☆43Updated 2 years ago
- An app to complete man in the middle attack with Tesla Model 3☆70Updated 5 months ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ☆110Updated last year
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆63Updated last year
- ☆131Updated 2 years ago
- ☆108Updated 11 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆244Updated 2 years ago
- ☆115Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Updated 2 years ago
- ☆279Updated 3 years ago
- Towards Universal Fuzzing of IoT Protocols.☆101Updated 6 months ago
- USB testing made easy☆119Updated 2 years ago
- Damn Vulnerable Vehicle Application☆75Updated 3 weeks ago
- Decrypt TP-Link Firmware☆69Updated 3 months ago
- exploits for CVE-2024-20017☆139Updated last year
- Arlo file format helper☆16Updated last year
- my advisory, poc, slides and scripts related to IoT/protocol security☆67Updated 4 months ago
- ☆26Updated 4 years ago
- A collection of tools for security research on Starlink's User Terminal☆156Updated 2 years ago
- Extendable Pentesting Framework☆154Updated this week
- Hack-a-Sat 4 2023 - Finals Public Release☆58Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆280Updated 2 weeks ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆131Updated 3 years ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆48Updated 10 months ago
- ☆207Updated last year
- This contains a list of tools for security assessments of android applications.☆40Updated 8 months ago