ehabhussein / AutoGadgetFSLinks
USB testing made easy
☆115Updated 2 years ago
Alternatives and similar repositories for AutoGadgetFS
Users that are interested in AutoGadgetFS are comparing it to the libraries listed below
Sorting:
- Bluetooth Low Energy hardware-less HackMe☆103Updated 4 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- A vehicle network analysis and attack tool.☆114Updated 3 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆23Updated 2 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- A vehicle network analysis and attack tool.☆17Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆190Updated 2 weeks ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- ☆16Updated 6 years ago
- This repository contains reverse engineering results and resources for a few specific car models of a very specific car manufacturer. Ple…☆93Updated 6 years ago
- BlueRepli-Plus☆17Updated 4 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 10 months ago
- ☆94Updated 4 years ago
- ☆77Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆109Updated last month
- Owfuzz: a WiFi protocol fuzzing tool☆231Updated 2 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- ☆40Updated 4 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆325Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 7 months ago
- Complete SMS packet manipulation☆113Updated 3 years ago
- An app to complete man in the middle attack with Tesla Model 3☆65Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- ☆69Updated 9 months ago
- Multipurpose Breakout for the FT232H☆95Updated last year
- USBNinja Embedded Software Framework☆59Updated 6 years ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆52Updated 5 years ago