phil-eqtech / CH-WorkshopLinks
Simulator forked from ICSim used during Car Hacking Workshops
☆19Updated last year
Alternatives and similar repositories for CH-Workshop
Users that are interested in CH-Workshop are comparing it to the libraries listed below
Sorting:
- A vehicle network analysis and attack tool.☆116Updated 4 years ago
- V2G evaluation tool☆21Updated 8 months ago
- ☆16Updated 3 years ago
- A vehicle network analysis and attack tool.☆18Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆28Updated 4 years ago
- ☆15Updated last year
- Content related to hardware hacking☆55Updated 6 years ago
- ☆131Updated 2 years ago
- USB testing made easy☆119Updated 2 years ago
- Bluetooth Security Assessment Methodology☆147Updated last week
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆197Updated 3 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆248Updated 9 months ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- ☆181Updated 2 weeks ago
- ☆41Updated 4 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆36Updated last year
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆86Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆65Updated 3 years ago
- Force target victim to unsafe network☆29Updated 7 months ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Updated 3 months ago
- ☆25Updated 9 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year