nccgroup / umap2Links
Umap2 is the second revision of NCC Group's python based USB host security assessment tool.
☆264Updated 3 years ago
Alternatives and similar repositories for umap2
Users that are interested in umap2 are comparing it to the libraries listed below
Sorting:
- The USB host security assessment tool☆282Updated 6 years ago
- ☆163Updated 8 years ago
- Some tools for testing USB devices☆134Updated 12 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆290Updated last year
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆162Updated 7 years ago
- ☆230Updated 2 years ago
- a 802.11 wireless fuzzer☆93Updated 12 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- An automated NFC fuzzing framework for Android devices.☆142Updated 4 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆250Updated 5 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated 2 months ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆92Updated 4 years ago
- Firmware scraper☆111Updated last year
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- QNX and BB10 Security Tools☆166Updated 9 years ago
- Nordic Semiconductor nRF5x series disassembly tools☆75Updated 7 years ago
- ☆21Updated 4 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆476Updated 4 years ago
- BootStomp: a bootloader vulnerability finder☆405Updated 3 years ago
- ☆220Updated 2 years ago
- a tool to analyze filesystem images for security☆502Updated last year
- Low-level NAND Flash dump and parsing utility☆302Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆444Updated last year
- Purposely Vulnerable Embedded Device☆22Updated 8 years ago
- BLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool☆138Updated 8 years ago