netspooky / dissectorsLinks
random dissectors
☆68Updated 2 years ago
Alternatives and similar repositories for dissectors
Users that are interested in dissectors are comparing it to the libraries listed below
Sorting:
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- Research tools developed for Intel Wi-Fi chips☆56Updated 4 months ago
- Still point in moving world.☆49Updated 3 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆155Updated last month
- Reverse engineering the TI AM3358 boot ROM☆53Updated last year
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 6 years ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆136Updated last month
- ☆79Updated last year
- ☆128Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆93Updated 3 years ago
- iTLB multihit PoC☆42Updated last year
- ☆33Updated 8 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- ☆135Updated last year
- A tool for firmware cartography☆160Updated 4 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆30Updated 4 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆120Updated 11 months ago
- ☆64Updated 2 years ago
- VSS Hardware Hacking Wiki and Blog Entries☆255Updated last year
- A repo for TPM sniffing greatness☆237Updated last month
- DEbian Cve REproducer Tool☆27Updated 3 months ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- ☆55Updated 2 years ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆31Updated last month
- A U-Boot hacking toolkit for security researchers and tinkerers☆272Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆50Updated last week
- Write ups for Ph0wn CTF☆47Updated 2 months ago