efchatz / WPAxFuzz
A full-featured open-source Wi-Fi fuzzer
☆187Updated last month
Alternatives and similar repositories for WPAxFuzz:
Users that are interested in WPAxFuzz are comparing it to the libraries listed below
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆233Updated 2 weeks ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆111Updated last year
- L2Fuzz Source Code☆37Updated last year
- ☆93Updated 3 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆229Updated 2 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆321Updated 11 months ago
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆193Updated 6 months ago
- An automatic Blind ROP exploitation tool☆205Updated last year
- ☆123Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆48Updated last year
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆38Updated 6 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆159Updated last year
- my advisory, poc, slides and scripts related to IoT/protocol security☆63Updated last year
- ☆24Updated 3 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆253Updated 5 months ago
- Bluetooth Security Assessment Methodology☆126Updated 11 months ago
- ☆70Updated last year
- Arlo file format helper☆12Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- An app to complete man in the middle attack with Tesla Model 3☆63Updated 2 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆54Updated last week
- Proof-of-concept code for Android APEX key reuse vulnerability☆89Updated last year
- prebuilt binaries for multiple architeture☆174Updated 2 years ago
- ☆214Updated last year
- ☆108Updated 8 months ago
- Damn Vulnerable Vehicle Application☆70Updated 2 years ago
- ☆278Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- awesome iot exploit resource☆54Updated 9 months ago