necst / CANflictLinks
☆16Updated 3 years ago
Alternatives and similar repositories for CANflict
Users that are interested in CANflict are comparing it to the libraries listed below
Sorting:
- Research tools developed for Intel Wi-Fi chips☆56Updated 4 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆19Updated last year
- ☆58Updated 2 months ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- A MBR Fuzzer☆29Updated last year
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆43Updated last month
- ☆21Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 8 months ago
- Towards Universal Fuzzing of IoT Protocols.☆99Updated 3 months ago
- HN Security's advisories.☆22Updated 3 weeks ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- A tool for firmware cartography☆160Updated 4 months ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆102Updated 8 months ago
- ☆17Updated 7 years ago
- Scapy hands-on☆34Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- TrustZone Trusted Application 0-Days by Design☆24Updated 5 months ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆103Updated 3 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆55Updated 3 years ago
- ☆133Updated this week
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago