☆16Sep 20, 2022Updated 3 years ago
Alternatives and similar repositories for CANflict
Users that are interested in CANflict are comparing it to the libraries listed below
Sorting:
- A state-aware defense framework against vehicular message injection attacks.☆36Sep 20, 2021Updated 4 years ago
- CAN Bus Voltage Dataset for the SIMPLE paper☆11Oct 2, 2019Updated 6 years ago
- Anomaly detection in CANBus traffic with LSTM and Autoencoders. Idea borrowed from publications such as: https://ieeexplore.ieee.org/docu…☆18Jan 8, 2021Updated 5 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆20Jun 19, 2025Updated 8 months ago
- Unofficial Insta360 GO 2, Insta360 GO 3 and Insta360 GO 3S cameras firmware tool☆25Nov 24, 2024Updated last year
- ☆10Dec 8, 2023Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago
- USB armory - hardware control tool☆34Aug 27, 2025Updated 6 months ago
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- A hacky tool for analysing linux kernel commits☆38Feb 7, 2023Updated 3 years ago
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- A LoRaWAN Security Evaluation Framework☆42Feb 11, 2024Updated 2 years ago
- ☆10Feb 20, 2017Updated 9 years ago
- 记录深度学习的过程☆10May 13, 2021Updated 4 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- ☆20Dec 24, 2025Updated 2 months ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- A modern, reactive, open source ACI GUI☆18Nov 17, 2016Updated 9 years ago
- I just wanted to try to do it myself. No more updates for the moment as the firmware is now too big for the radio's memory.☆10Jan 15, 2024Updated 2 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- TensorFlow implementation of GANomaly (with MNIST dataset)☆10Dec 2, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago
- ☆11Dec 28, 2025Updated 2 months ago
- Linux Debugger Prototype☆44Feb 12, 2022Updated 4 years ago
- brewpkg☆17Sep 30, 2025Updated 5 months ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- AGL Documentation - Source for general documents, guides ...☆10Oct 22, 2020Updated 5 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- ☆14Jul 22, 2024Updated last year
- See the unseen. This program visualizes radioactive traces, turning invisible pathways into vibrant maps.☆11Updated this week
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- Python-based JA3 Generation Server☆13Mar 29, 2020Updated 5 years ago
- Vehicular component authentication and software isolation☆13Nov 29, 2021Updated 4 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 3 years ago