tomasz-lisowski / simurai-usenixsec2024-aeLinks
☆17Updated 7 months ago
Alternatives and similar repositories for simurai-usenixsec2024-ae
Users that are interested in simurai-usenixsec2024-ae are comparing it to the libraries listed below
Sorting:
- Force target victim to unsafe network☆20Updated this week
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- A PC/SC IFD handler to attach swICC-based cards through a software PC/SC reader.☆31Updated 10 months ago
- ☆14Updated 9 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated 3 months ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 5 months ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆28Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 3 months ago
- A repository with UEFI research stuff☆15Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- ☆16Updated 3 years ago
- ☆24Updated 2 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 6 years ago
- ☆23Updated 4 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆15Updated 6 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 3 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- Corrupted files generator. Random bits flipper.☆23Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- ☆16Updated 8 years ago