mindstormsecurity / MACOBOXLinks
The all-in-one hacking toolbox for hardware penetration testing.
☆16Updated last year
Alternatives and similar repositories for MACOBOX
Users that are interested in MACOBOX are comparing it to the libraries listed below
Sorting:
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 10 months ago
- ☆26Updated last year
- Still point in moving world.☆51Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆17Updated 5 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- Complete SMS packet manipulation☆113Updated 3 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated 2 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Automated Malware Behavior Analysis Tool☆11Updated last week
- ☆20Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆12Updated 2 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- ☆27Updated 2 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆15Updated 3 years ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Fuzz Network Traffic☆18Updated 6 months ago