efchatz / WPAxFuzz
A full-featured open-source Wi-Fi fuzzer
☆187Updated last month
Alternatives and similar repositories for WPAxFuzz:
Users that are interested in WPAxFuzz are comparing it to the libraries listed below
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆109Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆234Updated 2 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆227Updated 2 years ago
- An automatic Blind ROP exploitation tool☆201Updated last year
- ☆88Updated 3 months ago
- L2Fuzz Source Code☆34Updated last year
- ☆203Updated 5 months ago
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆35Updated 5 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆157Updated last year
- Damn Vulnerable Vehicle Application☆70Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆316Updated 10 months ago
- ☆275Updated 2 years ago
- ☆70Updated last year
- An app to complete man in the middle attack with Tesla Model 3☆63Updated 2 years ago
- ☆123Updated last year
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆193Updated 5 months ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- ☆214Updated last year
- ☆92Updated 10 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆47Updated last week
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 4 months ago
- ☆93Updated 3 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆63Updated last year
- Arlo file format helper☆12Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆127Updated 2 years ago
- A tool for firmware cartography☆147Updated 3 months ago
- xortigate-cve-2023-27997☆62Updated last year
- USB device fuzzing on Android Phone☆31Updated 3 years ago