nccgroup / umap
The USB host security assessment tool
☆278Updated 6 years ago
Alternatives and similar repositories for umap:
Users that are interested in umap are comparing it to the libraries listed below
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆256Updated 3 years ago
- An automated NFC fuzzing framework for Android devices.☆140Updated 4 years ago
- a 802.11 wireless fuzzer☆91Updated 12 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated last week
- ☆162Updated 8 years ago
- Some tools for testing USB devices☆131Updated 12 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- RHme+ 2015 challenge☆111Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- Release Branches for MoFlow☆304Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆177Updated 9 years ago
- ☆137Updated 7 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆288Updated last year
- Dynamic security analysis of embedded systems’ firmwares☆81Updated 8 years ago
- ☆112Updated 7 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 7 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆246Updated 4 years ago
- ☆106Updated 9 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- Fix stack addresses (when no ASLR) with and without debugging☆180Updated 10 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago