relentless-warrior / 5GReasonerLinks
☆54Updated 5 years ago
Alternatives and similar repositories for 5GReasoner
Users that are interested in 5GReasoner are comparing it to the libraries listed below
Sorting:
- A negative testing framework, DoLTEst, for finding non-standard-compliant bugs in LTE protocol implementations of UEs☆37Updated 2 years ago
- ☆45Updated last year
- IKE fuzzer☆29Updated 10 years ago
- A tool for modifying and replaying 5G protocol network traffic using attack injection and fuzzing.☆91Updated last year
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆50Updated 4 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆165Updated last year
- A collection of academic papers / Git repos / conference talks / frameworks / tools related to cellular security and privacy.☆153Updated last month
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆54Updated last year
- Network and USB protocol fuzzing toolkit.☆69Updated 6 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆153Updated 4 years ago
- ☆53Updated 6 years ago
- ☆66Updated 4 years ago
- An O-RAN compliant runtime intrusion detection system (xApp) for layer-3 (L3) celluar attack detection☆51Updated 8 months ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆73Updated 4 years ago
- A curated list of awesome baseband research resources☆167Updated 5 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆47Updated 2 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 8 years ago
- ☆19Updated 3 months ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 4 years ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Updated 7 years ago
- ☆32Updated 4 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆33Updated 4 years ago
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- Security benchmarks for the Internet of Things☆22Updated 4 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- A tool that can be used to learn state machines from implementations.☆65Updated 4 years ago
- ☆66Updated 8 months ago
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- This is the public release of the code of our paper titled "Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Check…☆23Updated 2 years ago