mindstormsecurity / MACOBOXLinks
The all-in-one hacking toolbox for hardware penetration testing.
☆18Updated last year
Alternatives and similar repositories for MACOBOX
Users that are interested in MACOBOX are comparing it to the libraries listed below
Sorting:
- Simulator forked from ICSim used during Car Hacking Workshops☆19Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆69Updated last week
- ☆26Updated 2 years ago
- ☆15Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆13Updated 2 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- ☆72Updated 5 months ago
- ☆26Updated 3 weeks ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Updated 4 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated last year
- Bluetooth Security Assessment Methodology☆147Updated last month
- Write ups for Ph0wn CTF☆48Updated 5 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- A collection of my public security advisories.☆28Updated 2 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 4 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 3 years ago
- Reverse engineering the TI AM3358 boot ROM☆60Updated last year
- ☆23Updated 10 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Still point in moving world.☆49Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- ☆59Updated 6 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Updated 10 months ago
- Damn Vulnerable CICS Application☆29Updated last year