kevinmahaffey / tescatLinks
A tool to identify unique UDP payloads developed in order to audit the Tesla Model S's onboard ethernet traffic.
☆65Updated 10 years ago
Alternatives and similar repositories for tescat
Users that are interested in tescat are comparing it to the libraries listed below
Sorting:
- A PoC that the USB port is an attack surface for a Mazda car's infotainment system and how Mazda hacks are made☆160Updated 3 years ago
- CANToolz - framework for black-box CAN network analysis☆311Updated 7 years ago
- CANBadger - Hardware & Firmware Repository - An open-source automotive security research platform.☆64Updated 4 years ago
- Man in the Middle analysis tool for Bluetooth.☆528Updated 5 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Security advisories☆167Updated 9 years ago
- PASTA: Portable Automotive Security Testbed with Adaptability☆185Updated 2 years ago
- CAN Device Vehicle Research Server (OpenGarages.org)☆111Updated 12 years ago
- CAN of Fingers (c0f) creates passive fingerprints of Make and Model over CAN bus☆87Updated 10 years ago
- swiss army knife of Controller Area Networks (CAN) often used in cars and building automation, etc...☆205Updated 2 years ago
- A virtual car. Because you wouldn't download a car, would you?☆153Updated 5 years ago
- A reverse engineering tool for systems based on CAN bus communications☆83Updated 4 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- ☆38Updated 8 years ago
- pyvit: Python Vehicle Interface Toolkit☆510Updated 5 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- Some tools for testing USB devices☆134Updated 12 years ago
- Tesla root information dump☆267Updated 9 months ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Hackable Bluetooth stack in Python☆106Updated 6 years ago
- xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time | poc or gtfo☆393Updated 10 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆293Updated last year
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆270Updated 4 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆57Updated 7 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Firmware Modification Kit forked from https://code.google.com/p/firmware-mod-kit/ modded for OSX☆92Updated 2 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆35Updated 11 years ago
- A Saleae analyzer plugin for the SDQ (Apple Lightning, MagSafe, Battery) protocol.☆213Updated last year
- Saleae Logic plugin for decoding FlexRay packets☆91Updated 5 years ago