phil-eqtech / CH-WorkshopLinks
Simulator forked from ICSim used during Car Hacking Workshops
☆19Updated last year
Alternatives and similar repositories for CH-Workshop
Users that are interested in CH-Workshop are comparing it to the libraries listed below
Sorting:
- quick and dirty canbus h4xing framework☆149Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- A vehicle network analysis and attack tool.☆117Updated 4 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Bluetooth Security Assessment Methodology☆149Updated last month
- A vehicle network analysis and attack tool.☆19Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 3 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆250Updated 9 months ago
- ☆16Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆197Updated 4 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 2 years ago
- ☆131Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆30Updated 4 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆37Updated last year
- Force target victim to unsafe network☆30Updated 8 months ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆34Updated 5 months ago
- Reverse engineering the TI AM3358 boot ROM☆60Updated last year
- Content related to hardware hacking☆56Updated 6 years ago
- USB testing made easy☆120Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆71Updated last week
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆87Updated last year
- MQTT exploit and Pentesting guide for penetration tester☆23Updated 2 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆65Updated 3 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆54Updated last year
- ☆31Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago