rapid7 / akheron-proxyLinks
UART proxy tool for inter-chip analysis.
☆16Updated 2 months ago
Alternatives and similar repositories for akheron-proxy
Users that are interested in akheron-proxy are comparing it to the libraries listed below
Sorting:
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- The BUSSide Badge☆46Updated 3 years ago
- ☆11Updated 4 years ago
- Bluetooth PIN and LINK-KEY Cracker☆9Updated 7 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆84Updated 11 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 8 months ago
- Random Hashcat Scrips☆29Updated 7 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆77Updated 7 months ago
- ☆39Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ☆46Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆22Updated 8 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 5 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 5 years ago
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- wordlists for password cracking☆28Updated 2 years ago
- ☆22Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- Collection of rules and debug data for hashcat☆19Updated 7 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago