nccgroup / EDIDFuzzerLinks
EDID (Enhanced Display Identification Data) Fuzzer
☆18Updated 11 years ago
Alternatives and similar repositories for EDIDFuzzer
Users that are interested in EDIDFuzzer are comparing it to the libraries listed below
Sorting:
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 11 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 9 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Updated 10 years ago
- ☆23Updated 4 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 7 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- ☆36Updated 9 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆44Updated 9 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆80Updated 5 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- ☆84Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- ZigBee hacking tools and scripts☆13Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 11 years ago