rapid7 / akheron-proxyLinks
UART proxy tool for inter-chip analysis.
☆21Updated 8 months ago
Alternatives and similar repositories for akheron-proxy
Users that are interested in akheron-proxy are comparing it to the libraries listed below
Sorting:
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- ☆11Updated 4 years ago
- Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
- ☆73Updated last year
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- The BUSSide Badge☆48Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Random Hashcat Scrips☆33Updated last year
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- ☄️ go-out - A Golang egress buster.☆128Updated last year
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- OSDP attack tool (and the Elvish word for friend)☆107Updated 2 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Updated 11 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆47Updated 5 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆38Updated 6 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Updated 9 years ago
- ☆41Updated 3 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Multipurpose Breakout for the FT232H☆94Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 2 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago