Advanced: Bluetooth low energy capture the flag
☆65Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for ble_ctf_infinity
Users that are interested in ble_ctf_infinity are comparing it to the libraries listed below
Sorting:
- A Bluetooth low energy capture the flag☆747Mar 14, 2026Updated last week
- x86 / x64 Processor Manual for Binary Ninja☆16Mar 7, 2019Updated 7 years ago
- ☆14Sep 2, 2020Updated 5 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆77Oct 6, 2024Updated last year
- OWASP Embedded Application Security Project☆18Jan 17, 2022Updated 4 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- This will be a wiki when it grows up, if it grows up☆95Aug 11, 2025Updated 7 months ago
- ☆23Jun 22, 2024Updated last year
- Small project to capture BLE data from a xiaomi hygrometer-thermometer.☆19Aug 29, 2020Updated 5 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- An amateur radio fox transmitter for fox hunting☆20Nov 24, 2025Updated 3 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆93Aug 3, 2025Updated 7 months ago
- The BUSSide☆19Oct 10, 2021Updated 4 years ago
- Damn Vulnerable IoT Device☆219Feb 12, 2024Updated 2 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆875Oct 5, 2025Updated 5 months ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- ☆24Feb 15, 2013Updated 13 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Apr 10, 2018Updated 7 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆34Mar 8, 2026Updated last week
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- ☆11Oct 13, 2019Updated 6 years ago
- understanding the tinyfpga bootloader☆25Apr 22, 2018Updated 7 years ago
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆179Feb 7, 2016Updated 10 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- Setup script for Red Teams☆14Apr 7, 2025Updated 11 months ago
- Security scanning & static analysis tool☆93Oct 17, 2024Updated last year