mindstormsecurity / MACOBOXLinks
The all-in-one hacking toolbox for hardware penetration testing.
☆18Updated last year
Alternatives and similar repositories for MACOBOX
Users that are interested in MACOBOX are comparing it to the libraries listed below
Sorting:
- Simulator forked from ICSim used during Car Hacking Workshops☆17Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- Kiwi PN532 SPI library for Arduino☆16Updated last month
- ☆55Updated 10 months ago
- ☆28Updated 7 months ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- ☆25Updated last year
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆19Updated 3 weeks ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- ☆20Updated 5 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆75Updated 10 months ago
- ☆26Updated last year
- Still point in moving world.☆51Updated 2 years ago
- ☆20Updated last year
- ☆69Updated 2 weeks ago
- ☆37Updated 3 years ago
- Reverse engineering the TI AM3358 boot ROM☆53Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- ☆24Updated 3 years ago
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆18Updated last week
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 9 months ago
- OSDP attack tool (and the Elvish word for friend)☆100Updated 2 years ago
- Hardware Hacking Cheatsheet infograph☆154Updated last year
- Force target victim to unsafe network☆26Updated 2 months ago
- Write ups for Ph0wn CTF☆44Updated 3 weeks ago
- ☆33Updated this week
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago