necst / CANflict
☆16Updated 2 years ago
Alternatives and similar repositories for CANflict:
Users that are interested in CANflict are comparing it to the libraries listed below
- Collection of RH850 Glitches☆54Updated last year
- ☆21Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 6 months ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- ☆23Updated 3 weeks ago
- Autofuze has been developped to provide a full toolkit to fuzz and pentest several protocols used in automotive industry such as USB, XCP…☆38Updated last year
- ☆13Updated last year
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆31Updated 4 months ago
- CANvas is a fast and inexpensive automotive network mapper that can serve as a basis for many other security applications.☆28Updated 4 years ago
- A MBR Fuzzer☆28Updated 11 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- PoC code and tools for Black Hat USA 2024☆17Updated 7 months ago
- Research tools developed for Intel Wi-Fi chips☆51Updated last year
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆18Updated this week
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆15Updated last year
- Fuzzing the COVESA/vsomeip library with AFL++☆22Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- ☆11Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆33Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆35Updated 2 months ago
- A vehicle network analysis and attack tool.☆17Updated last year
- ☆21Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆30Updated 3 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆31Updated 11 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆115Updated 2 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆88Updated 9 months ago
- ☆11Updated 4 months ago