nccgroup / umapLinks
The USB host security assessment tool
☆282Updated 6 years ago
Alternatives and similar repositories for umap
Users that are interested in umap are comparing it to the libraries listed below
Sorting:
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 4 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago
- ☆138Updated 7 years ago
- ☆122Updated 8 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- ☆106Updated 9 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- Purposely Vulnerable Embedded Device☆22Updated 8 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- ☆163Updated 8 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated 2 months ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Some tools for testing USB devices☆134Updated 12 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆290Updated last year
- Security advisories☆168Updated 9 years ago
- Tools for analyzing hexagon code☆39Updated 9 years ago
- ☆112Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- ☆21Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 5 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago