efchatz / WPAxFuzzLinks
A full-featured open-source Wi-Fi fuzzer
☆194Updated 2 months ago
Alternatives and similar repositories for WPAxFuzz
Users that are interested in WPAxFuzz are comparing it to the libraries listed below
Sorting:
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆239Updated 4 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆117Updated last year
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆334Updated last year
- An app to complete man in the middle attack with Tesla Model 3☆66Updated last month
- ☆102Updated 7 months ago
- An automatic Blind ROP exploitation tool☆203Updated 2 years ago
- L2Fuzz Source Code☆41Updated last year
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆52Updated 10 months ago
- ☆127Updated last year
- Arlo file format helper☆14Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- ☆113Updated last year
- exploits for CVE-2024-20017☆139Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆266Updated 9 months ago
- ☆104Updated 8 months ago
- Towards Universal Fuzzing of IoT Protocols.☆99Updated 2 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆237Updated 2 years ago
- ☆277Updated 3 years ago
- ☆206Updated 10 months ago
- Damn Vulnerable Vehicle Application☆72Updated 2 years ago
- USB testing made easy☆116Updated 2 years ago
- A tool for firmware cartography☆158Updated 3 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆82Updated 2 weeks ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆41Updated 6 months ago
- quick and dirty canbus h4xing framework☆145Updated 11 months ago