nccgroup / umapLinks
The USB host security assessment tool
☆281Updated 6 years ago
Alternatives and similar repositories for umap
Users that are interested in umap are comparing it to the libraries listed below
Sorting:
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- a 802.11 wireless fuzzer☆92Updated 12 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 4 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆161Updated 7 years ago
- ☆138Updated 7 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- ☆163Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 8 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆288Updated last year
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- ☆121Updated 8 years ago
- Some tools for testing USB devices☆132Updated 12 years ago
- ☆106Updated 9 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- Security advisories☆168Updated 9 years ago
- Release Branches for MoFlow☆305Updated 9 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆249Updated 5 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- ☆113Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆82Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago