nonamecoder / CVE-2022-27254Links
PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)
☆455Updated 3 years ago
Alternatives and similar repositories for CVE-2022-27254
Users that are interested in CVE-2022-27254 are comparing it to the libraries listed below
Sorting:
- ☆520Updated 7 months ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆346Updated last year
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆505Updated 11 months ago
- Nginx 18.1 04/09/22 zero-day repo☆374Updated 3 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆237Updated 4 months ago
- ☆1,013Updated 2 years ago
- ☆277Updated 3 years ago
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆517Updated last year
- ☆579Updated last month
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆686Updated 3 years ago
- ☆205Updated 10 months ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 3 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆511Updated 3 weeks ago
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆223Updated 2 years ago
- Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)☆414Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 3 weeks ago
- A crossplatform mDNS enumeration tool.☆355Updated 2 years ago
- Files for HackRF + Portapack MAYHEM firmware to open any and all Tesla vehicle charging ports in range!☆183Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,112Updated 3 years ago
- Drone pentesting framework console☆1,589Updated 9 months ago
- CVE-2022-0995 exploit☆495Updated 3 years ago
- ☆1,274Updated 4 months ago
- The CAN Injection Toolkit☆286Updated 4 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆854Updated 4 months ago
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago
- Some stuff about Hardware Hacking☆603Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆395Updated 4 years ago
- ☆167Updated 2 weeks ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆329Updated 11 months ago