necst / CANflictLinks
☆16Updated 3 years ago
Alternatives and similar repositories for CANflict
Users that are interested in CANflict are comparing it to the libraries listed below
Sorting:
- ☆53Updated 2 months ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 3 months ago
- ☆21Updated 2 years ago
- Towards Universal Fuzzing of IoT Protocols.☆99Updated 2 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- A MBR Fuzzer☆29Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆18Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆41Updated last month
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆46Updated last year
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ☆102Updated 8 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- A negative testing framework, DoLTEst, for finding non-standard-compliant bugs in LTE protocol implementations of UEs☆38Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 9 months ago
- Discover Non-Discoverable Bluetooth Classic devices☆11Updated 11 months ago
- ☆96Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆118Updated last year
- BINARLY Research Tools and PoCs☆37Updated 11 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- ☆18Updated 5 years ago
- ☆17Updated 7 years ago
- ☆22Updated 7 months ago
- A tool for firmware cartography☆158Updated 3 months ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆51Updated 4 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 10 months ago