quarkslab / starlink-toolsLinks
A collection of tools for security research on Starlink's User Terminal
☆145Updated last year
Alternatives and similar repositories for starlink-tools
Users that are interested in starlink-tools are comparing it to the libraries listed below
Sorting:
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆113Updated last year
- Hack-a-Sat 4 2023 - Finals Public Release☆48Updated last year
- ☆93Updated last year
- ☆99Updated 4 months ago
- ☆90Updated 4 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆48Updated last year
- CVE-2023-4911 proof of concept☆168Updated last year
- A full-featured open-source Wi-Fi fuzzer☆189Updated last month
- ☆123Updated last year
- Research tools developed for Intel Wi-Fi chips☆54Updated last year
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆109Updated 2 weeks ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆63Updated last year
- Reverse engineering the TI AM3358 boot ROM☆53Updated 9 months ago
- ☆41Updated last year
- Damn Vulnerable Vehicle Application☆70Updated 2 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆232Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- A tool for firmware cartography☆152Updated this week
- ☆320Updated 11 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated 11 months ago
- ☆124Updated 6 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆32Updated 6 months ago
- MikroTik remote jailbreak for v6.x.x☆133Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆124Updated 5 months ago
- Linux kernel privilege escalation techniques☆138Updated 9 months ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆91Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆114Updated last week
- POC of CVE-2023-35086 only DoS☆45Updated last year