usbarmory / mxc-scc2Links
NXP Security Controller (SCCv2) - Linux driver
☆19Updated 8 months ago
Alternatives and similar repositories for mxc-scc2
Users that are interested in mxc-scc2 are comparing it to the libraries listed below
Sorting:
- Password manager for USB Armory☆37Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 10 years ago
- ☆30Updated 10 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- USB armory Debian base image☆83Updated this week
- ☆36Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆25Updated 10 years ago
- Base OpenXT build scripts☆50Updated 4 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆21Updated 9 years ago
- an open source toolkit for PCI bus exploration☆72Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- ☆57Updated 11 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Updated last year
- utility for emulating a USB HID keyboard with the USBArmory☆44Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago