francozappa / REarbyLinks
Toolkit developed to reverse engineer Google's Nearby Connections API
☆23Updated 6 years ago
Alternatives and similar repositories for REarby
Users that are interested in REarby are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Some tee/trustzone helper stuff☆54Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Telco training☆26Updated 6 years ago
- ☆18Updated 6 years ago
- ☆31Updated 4 months ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- ☆97Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- test SSL/TLS clients how secure they are☆25Updated 4 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Updated last year
- Symbol REPL☆31Updated 7 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago