francozappa / knobLinks
Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]
☆186Updated 3 years ago
Alternatives and similar repositories for knob
Users that are interested in knob are comparing it to the libraries listed below
Sorting:
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆142Updated 9 years ago
- Penetration testing framework for ZigBee security research.☆118Updated 7 years ago
- ☆123Updated 9 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆158Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆163Updated 7 years ago
- ☆104Updated 3 years ago
- Bluetooth Low Energy hardware-less HackMe☆102Updated 4 years ago
- CSAW Embedded Security Challenge 2019☆36Updated 5 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆271Updated 4 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- The USB host security assessment tool☆282Updated 6 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆447Updated last year
- USB testing made easy☆116Updated 2 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- ☆233Updated 2 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019☆106Updated 3 years ago
- List of the tools and usage☆234Updated 3 months ago
- A ZigBee hacking toolkit by Bishop Fox☆288Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆90Updated 7 years ago
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Updated 9 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆155Updated 7 years ago
- Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.☆313Updated 3 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆116Updated 6 years ago
- ☆106Updated 9 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 6 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago
- Content related to hardware hacking☆53Updated 6 years ago