Guides and scripts for vehicle cybersecurity research
☆50Mar 7, 2020Updated 5 years ago
Alternatives and similar repositories for vehicle-hacking
Users that are interested in vehicle-hacking are comparing it to the libraries listed below
Sorting:
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Code from Chris Valasek @nudehaberdasher and Charlie Miller @0xcharlie car hack: http://blog.ioactive.com/2013/08/car-hacking-content.ht…☆14Oct 1, 2020Updated 5 years ago
- Amarisoft LTE - 4G Selective Jammer Core☆13Nov 24, 2019Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆45Apr 17, 2021Updated 4 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- ☆16Jan 2, 2025Updated last year
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- Awesome list for baseband modem resources.☆13Jun 20, 2018Updated 7 years ago
- Open source SDR LTE software suite from Software Radio Systems (SRS)☆14Sep 6, 2019Updated 6 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- This repository contains some documentation to configure an 802.11p device using an apu1d4 board☆11May 13, 2016Updated 9 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- A book on learning radare2.☆48Sep 15, 2020Updated 5 years ago
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆96Mar 27, 2018Updated 7 years ago
- CAN of Fingers (c0f) creates passive fingerprints of Make and Model over CAN bus☆92Sep 29, 2015Updated 10 years ago
- ☆14Jul 9, 2018Updated 7 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- LTE Link Monitor app for nRF Connect for Desktop☆13Apr 3, 2024Updated last year
- ☆13Apr 11, 2018Updated 7 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆19Mar 31, 2025Updated 11 months ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Hackmelock Android application☆17Apr 11, 2017Updated 8 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago