☆17Jul 20, 2018Updated 7 years ago
Alternatives and similar repositories for Bluetooth-RFCOMM-fuzzer
Users that are interested in Bluetooth-RFCOMM-fuzzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Nov 5, 2015Updated 10 years ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 3 years ago
- L2Fuzz Source Code☆44Dec 15, 2023Updated 2 years ago
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- ☆18May 25, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- poc for cve-2020-0022☆67Jul 16, 2020Updated 5 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆65Mar 18, 2017Updated 9 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Sep 14, 2017Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- ☆70Mar 22, 2026Updated 3 weeks ago
- 基于Drozer对Android的四大组件进行批量处理☆21Jan 15, 2020Updated 6 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Jan 4, 2024Updated 2 years ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 11 months ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 6 months ago
- An SDR-based open-source C-V2X traffic generator for stress testing vehicular communication☆30May 10, 2022Updated 3 years ago
- ☆33Mar 31, 2026Updated 2 weeks ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆461Feb 7, 2024Updated 2 years ago
- nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles☆94Oct 19, 2020Updated 5 years ago
- ☆245Sep 21, 2021Updated 4 years ago
- jie.ac.cn 中国杰学院☆11Jun 27, 2023Updated 2 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- USB device fuzzing on Android Phone☆35Oct 16, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted A…☆99Oct 8, 2025Updated 6 months ago
- 常用蓝牙漏洞CVE poc、EXP☆38Aug 22, 2018Updated 7 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Patches for VoIPER http://sourceforge.net/projects/voiper/ to better support client fuzzing☆19Sep 29, 2015Updated 10 years ago
- Thesis for my masters in Computer Science☆11Jul 10, 2017Updated 8 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆28Dec 19, 2025Updated 4 months ago