ehabhussein / AutoGadgetFSLinks
USB testing made easy
☆116Updated 2 years ago
Alternatives and similar repositories for AutoGadgetFS
Users that are interested in AutoGadgetFS are comparing it to the libraries listed below
Sorting:
- Bluetooth Low Energy hardware-less HackMe☆103Updated 4 years ago
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- A full-featured open-source Wi-Fi fuzzer☆193Updated 2 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- ☆16Updated 7 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆23Updated 2 years ago
- BlueRepli-Plus☆17Updated 5 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 9 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Research tools developed for Intel Wi-Fi chips☆55Updated 2 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆237Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Content related to hardware hacking☆53Updated 6 years ago
- ☆40Updated 4 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆156Updated 4 years ago
- ☆94Updated 5 years ago
- A vehicle network analysis and attack tool.☆18Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆327Updated last year
- Read only mirror - No pull requests☆19Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆108Updated 3 months ago
- Complete SMS packet manipulation☆114Updated 3 years ago
- An app to complete man in the middle attack with Tesla Model 3☆66Updated 3 weeks ago
- ☆219Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆29Updated 6 years ago