francozappa / REarbyLinks
Toolkit developed to reverse engineer Google's Nearby Connections API
☆23Updated 6 years ago
Alternatives and similar repositories for REarby
Users that are interested in REarby are comparing it to the libraries listed below
Sorting:
- Some tee/trustzone helper stuff☆54Updated 5 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- ☆31Updated 4 months ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- Telco training☆26Updated 6 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆90Updated 4 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Patches those pesky APKs for proxy use.☆50Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- cve-2019-11931☆35Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- ☆18Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Updated 4 years ago