The USB host security assessment tool
☆286Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for umap
Users that are interested in umap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Sep 30, 2021Updated 4 years ago
- A GUI-based USB device fuzzer☆64Oct 12, 2017Updated 8 years ago
- ☆168Apr 2, 2017Updated 8 years ago
- Implement your own USB device in Python, supported by a hardware peripheral such as Cynthion or GreatFET☆946Feb 25, 2026Updated 3 weeks ago
- Some tools for testing USB devices☆134Oct 29, 2012Updated 13 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- UPnP Pentest Toolkit for Windows☆261Nov 13, 2014Updated 11 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- QNX and BB10 Security Tools☆167Mar 19, 2016Updated 10 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- This repository is deprecated. Go to:☆120May 27, 2019Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Apr 28, 2022Updated 3 years ago
- CANToolz - framework for black-box CAN network analysis☆313Oct 31, 2017Updated 8 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- Bluetooth Low Energy Device spoofing library☆29Nov 20, 2017Updated 8 years ago
- a 802.11 wireless fuzzer☆93Jan 25, 2013Updated 13 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Apr 25, 2017Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆146Aug 25, 2016Updated 9 years ago