necst / CANflict
☆15Updated 2 years ago
Related projects: ⓘ
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- ☆9Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆15Updated last week
- Autofuze has been developped to provide a full toolkit to fuzz and pentest several protocols used in automotive industry such as USB, XCP…☆34Updated 8 months ago
- A framework for parsing binary data.☆16Updated 2 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆14Updated 2 weeks ago
- ☆16Updated 6 years ago
- ☆20Updated 11 months ago
- Research tools developed for Intel Wi-Fi chips☆48Updated 8 months ago
- Fuzzing the COVESA/vsomeip library with AFL++☆21Updated 2 years ago
- ☆13Updated last year
- ☆20Updated 3 months ago
- A MBR Fuzzer☆27Updated 5 months ago
- The Dumb Network Fuzzer☆20Updated last year
- Rust crate providing a variety of automotive related libraries, such as communicating with CAN interfaces and diagnostic APIs☆39Updated 2 weeks ago
- Damn Vulnerable Vehicle Application☆68Updated last year
- ☆18Updated 3 weeks ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆11Updated 3 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆62Updated last year
- An automated setup for fuzzing Redis w/ AFL++☆26Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆22Updated 7 months ago
- PoC code and tools for Black Hat USA 2024☆15Updated last month
- ☆72Updated 3 months ago
- A tool to perform so called BGE attack☆20Updated 5 months ago
- Ledger Donjon CTF 2020☆17Updated 2 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆28Updated last year
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- HN Security's advisories.☆20Updated 3 months ago