serma-safety-security / hardsploit-gui-ruby
HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox
☆39Updated 4 years ago
Alternatives and similar repositories for hardsploit-gui-ruby:
Users that are interested in hardsploit-gui-ruby are comparing it to the libraries listed below
- HARDSPLOIT API : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆10Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Updated 4 years ago
- lte security☆41Updated 9 years ago
- ☆20Updated 8 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- a 802.11 wireless fuzzer☆91Updated 12 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- ☆106Updated 9 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 10 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Ubertooth library for Android☆38Updated 12 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Hackmelock Android application☆17Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆60Updated 6 years ago
- NCC Group Open Source RF Security Testing Methodology☆91Updated 2 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆14Updated 4 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆55Updated 7 years ago