stealthdos / CAN-Denial-of-Service
☆17Updated 8 years ago
Alternatives and similar repositories for CAN-Denial-of-Service:
Users that are interested in CAN-Denial-of-Service are comparing it to the libraries listed below
- 802.15.4 Fuzzer☆21Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 7 months ago
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- Proof-of-Concept code for exploits☆82Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Writeups for the RHME2 CTF☆11Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆41Updated 5 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- CTF Finals☆17Updated 7 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆54Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆60Updated 6 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆25Updated 7 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 8 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- ☆21Updated 4 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago