nccgroup / EDIDFuzzer
EDID (Enhanced Display Identification Data) Fuzzer
☆17Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for EDIDFuzzer
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆11Updated 7 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆29Updated 11 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 8 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Automatically exported from code.google.com/p/bcmon☆8Updated 9 years ago
- Various projects aiming at unlocking and programming the MINI54ZAN microcontroller☆18Updated 4 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 11 years ago
- ☆16Updated 9 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- ☆10Updated 7 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 11 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆54Updated 6 years ago
- Various pentest scripts☆14Updated 10 years ago
- ☆20Updated 8 years ago
- Format string exploit generation☆9Updated 9 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- ldid and ldid2☆13Updated 6 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 7 years ago