rapid7 / akheron-proxyLinks
UART proxy tool for inter-chip analysis.
☆21Updated 7 months ago
Alternatives and similar repositories for akheron-proxy
Users that are interested in akheron-proxy are comparing it to the libraries listed below
Sorting:
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- The BUSSide Badge☆48Updated 3 years ago
- Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
- ☆11Updated 4 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated 2 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Updated 11 years ago
- ☆73Updated last year
- Random Hashcat Scrips☆33Updated last year
- THC "R U There" network discovery tool☆29Updated 5 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last year
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Big Iron Recon & Pwnage☆125Updated 3 years ago
- ☆69Updated 2 months ago