nccgroup / umapLinks
The USB host security assessment tool
☆286Updated 7 years ago
Alternatives and similar repositories for umap
Users that are interested in umap are comparing it to the libraries listed below
Sorting:
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- a 802.11 wireless fuzzer☆93Updated 13 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- An automated NFC fuzzing framework for Android devices.☆143Updated 5 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Updated 7 years ago
- ☆137Updated 7 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 8 years ago
- ☆124Updated 9 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 8 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- ☆167Updated 8 years ago
- ☆106Updated 10 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 10 years ago
- Some tools for testing USB devices☆134Updated 13 years ago
- ☆111Updated 8 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆299Updated 2 years ago
- Radare Congress Stuff☆214Updated 3 months ago
- Release Branches for MoFlow☆307Updated 10 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆157Updated 4 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- Library for creating CTF services.☆75Updated 9 years ago