Advanced: Bluetooth low energy capture the flag
☆65Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for ble_ctf_infinity
Users that are interested in ble_ctf_infinity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Bluetooth low energy capture the flag☆759Mar 26, 2026Updated last month
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Apr 7, 2015Updated 11 years ago
- ☆14Sep 2, 2020Updated 5 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆78Oct 6, 2024Updated last year
- OWASP Embedded Application Security Project☆18Jan 17, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- This will be a wiki when it grows up, if it grows up☆96Aug 11, 2025Updated 9 months ago
- Script used to track airtags (using Apple's Find My-network through the Find My-app on macOS) and save the location history data to CSV f…☆14Nov 19, 2024Updated last year
- ☆10Apr 11, 2023Updated 3 years ago
- GitLab Attack TOolkit☆34Apr 24, 2026Updated 3 weeks ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 9 months ago
- Damn Vulnerable IoT Device☆220Feb 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generate WWVB timecodes for any desired time☆10Sep 8, 2025Updated 8 months ago
- ☆72Jul 24, 2025Updated 9 months ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated 3 months ago
- ☆22Oct 24, 2016Updated 9 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆895Oct 5, 2025Updated 7 months ago
- ☆24Feb 15, 2013Updated 13 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Sep 17, 2017Updated 8 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Android Automation Tool☆21May 9, 2018Updated 8 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆93Jan 14, 2026Updated 4 months ago
- ☆11Oct 13, 2019Updated 6 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Efflanrs - GUI for Snaffler Output☆27Sep 13, 2024Updated last year
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆35Mar 8, 2026Updated 2 months ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- scripts and examples for using JTAG debug tools to gain root access☆180Feb 7, 2016Updated 10 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆61Feb 4, 2025Updated last year
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago