sgayou / medfusion-4000-research
Medfusion 4000 security research & a MQX RCE.
☆335Updated 6 years ago
Related projects: ⓘ
- RHme+ 2015 challenge☆106Updated 8 years ago
- The USB host security assessment tool☆270Updated 5 years ago
- ☆155Updated 7 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆280Updated 9 months ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆48Updated 7 years ago
- X41 Smartcard Fuzzer☆114Updated 5 years ago
- Radare 2 wiki☆90Updated 4 years ago
- scripts and examples for using JTAG debug tools to gain root access☆170Updated 8 years ago
- Stuff from CTF contests☆40Updated 5 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆251Updated 2 years ago
- Exploitation on ARM-based Systems (Troopers18)☆146Updated 6 years ago
- A GUI-based USB device fuzzer☆60Updated 6 years ago
- Radare Congress Stuff☆201Updated 3 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆155Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 6 years ago
- Some tools for testing USB devices☆127Updated 11 years ago
- ☆138Updated 8 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆149Updated last year
- Riscure Hack Me embedded hardware CTF 2017-2018.☆84Updated 6 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- ☆40Updated this week
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Software from the NorthSec badge☆44Updated last month
- A portable reverse engineering environment using docker.☆205Updated 6 years ago
- ☆85Updated this week
- Purposely Vulnerable Embedded Device☆21Updated 7 years ago
- All related files and slides for past talks☆44Updated last year
- ☆49Updated 6 years ago