khuntpav / V2GEvilLinks
V2G evaluation tool
☆21Updated 8 months ago
Alternatives and similar repositories for V2GEvil
Users that are interested in V2GEvil are comparing it to the libraries listed below
Sorting:
- Simulator forked from ICSim used during Car Hacking Workshops☆19Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- quick and dirty canbus h4xing framework☆147Updated last year
- Bluetooth Security Assessment Methodology☆147Updated last year
- ☆130Updated 2 years ago
- Write ups for Ph0wn CTF☆47Updated 5 months ago
- A full-featured open-source Wi-Fi fuzzer☆196Updated 3 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆26Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆66Updated 2 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Workshop on firmware reverse engineering☆353Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆125Updated last month
- ☆110Updated last year
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆28Updated 4 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- Remote C2-style MCP server for Frida instrumentation on rooted Android☆26Updated last week
- ☆25Updated 9 months ago
- A tool for firmware cartography☆162Updated last month
- ☆27Updated 3 years ago
- A vehicle network analysis and attack tool.☆116Updated 4 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Updated 2 years ago
- MQTT exploit and Pentesting guide for penetration tester☆23Updated 2 years ago
- Reverse engineering the TI AM3358 boot ROM☆59Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- External Playbooks for Public Access☆40Updated 11 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago