francozappa / REarbyLinks
Toolkit developed to reverse engineer Google's Nearby Connections API
☆23Updated 6 years ago
Alternatives and similar repositories for REarby
Users that are interested in REarby are comparing it to the libraries listed below
Sorting:
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Telco training☆26Updated 6 years ago
- Some tee/trustzone helper stuff☆54Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Vulnerability Reports by Aleph Research☆35Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆31Updated 3 weeks ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆91Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 6 years ago
- ☆96Updated 5 years ago
- Security advisories published by Enable Security☆46Updated 2 months ago
- Presented hardware reverse engineering workshops since 2019☆62Updated last year
- SIM Card tunnel for Alcatel OT-918D☆37Updated 11 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆13Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆23Updated 2 years ago