netspooky / dissectorsLinks
random dissectors
☆68Updated 2 years ago
Alternatives and similar repositories for dissectors
Users that are interested in dissectors are comparing it to the libraries listed below
Sorting:
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated last year
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆141Updated 2 weeks ago
- ☆131Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- ☆79Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆65Updated last month
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆34Updated 3 weeks ago
- VSS Hardware Hacking Wiki and Blog Entries☆259Updated 2 years ago
- Reverse engineering the TI AM3358 boot ROM☆59Updated last year
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆57Updated 6 years ago
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆166Updated 3 months ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆103Updated 3 years ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆45Updated 11 months ago
- DEbian Cve REproducer Tool☆27Updated 3 weeks ago
- ☆136Updated last year
- iTLB multihit PoC☆42Updated 2 years ago
- A repo for TPM sniffing greatness☆242Updated last week
- Binary Protocol Differ☆118Updated 5 years ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆33Updated 3 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- A tool for firmware cartography☆161Updated 2 weeks ago
- ☆59Updated 2 years ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆265Updated 3 weeks ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Automated Firebase security scanner to check for unauthorized read and write access on firestore, realtime databases, storage buckets and…☆33Updated 2 months ago
- Resources for Fault Injection☆58Updated last year
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆222Updated 2 years ago
- ☆65Updated 3 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago