redballoonsecurity / bal-visualizer
A vizualization tool for data generated by the bal framework
☆11Updated 2 years ago
Alternatives and similar repositories for bal-visualizer:
Users that are interested in bal-visualizer are comparing it to the libraries listed below
- A framework for parsing binary data.☆16Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆16Updated 5 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆16Updated 2 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- ☆17Updated 10 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- ☆31Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- ☆16Updated 6 years ago
- Some stuff about telecom security☆14Updated 8 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Hostile Dropboxes Management☆25Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago