tomasz-lisowski / simurai-usenixsec2024-aeLinks
☆19Updated last year
Alternatives and similar repositories for simurai-usenixsec2024-ae
Users that are interested in simurai-usenixsec2024-ae are comparing it to the libraries listed below
Sorting:
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- A repository with UEFI research stuff☆16Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated 2 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated 2 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Force target victim to unsafe network☆29Updated 6 months ago
- A PC/SC IFD handler to attach swICC-based cards through a software PC/SC reader.☆32Updated last year
- ☆16Updated last year
- ☆24Updated 3 years ago
- OpenBTS-UMTS reloaded 2024. Compatibility with latest UHD drivers, several fixes and updated install documentation for Ubuntu 22.04☆60Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆82Updated last year
- ☆21Updated 4 years ago
- A tool to test SIM card security☆135Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Complete SMS packet manipulation☆113Updated 4 years ago
- Common python and scapy scripts for Wi-Fi☆64Updated last month
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Corrupted files generator. Random bits flipper.☆27Updated 2 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆67Updated 3 years ago
- ☆105Updated 10 months ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 10 months ago
- ☆25Updated 5 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year