rapid7 / akheron-proxy
UART proxy tool for inter-chip analysis.
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for akheron-proxy
- The BUSSide Badge☆46Updated 2 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated last year
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆84Updated 10 years ago
- Random Hashcat Scrips☆22Updated 3 weeks ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆13Updated 2 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆21Updated 7 years ago
- ☆38Updated 2 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 8 years ago
- BLEMystique is an ESP32 based custom BLE target☆15Updated 5 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆23Updated 10 months ago
- Bluetooth PIN and LINK-KEY Cracker☆9Updated 6 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆54Updated 3 years ago
- Research on the Gallagher / Cardax access control system☆63Updated 4 years ago
- Collection of rules and debug data for hashcat☆17Updated 7 years ago
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆17Updated 5 years ago
- ☆46Updated 4 years ago
- ☆65Updated last month
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- ☆33Updated 4 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆14Updated 2 months ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆16Updated 2 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- ☆18Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆61Updated 4 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆18Updated 5 years ago