usbarmory / mxc-scc2Links
NXP Security Controller (SCCv2) - Linux driver
☆19Updated 6 months ago
Alternatives and similar repositories for mxc-scc2
Users that are interested in mxc-scc2 are comparing it to the libraries listed below
Sorting:
- Password manager for USB Armory☆36Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Updated 7 years ago
- ☆30Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 5 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆21Updated 9 years ago
- ☆57Updated 11 years ago
- ☆24Updated 10 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Updated 11 months ago
- A feedhunter's visualisation tool.☆16Updated 10 years ago
- Base OpenXT build scripts☆50Updated 4 years ago
- ☆36Updated 9 years ago
- USB armory Debian base image☆82Updated 2 weeks ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- lte security☆41Updated 9 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- USB armory - Mass Storage firmware☆24Updated 2 weeks ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Packet-o-matic NG !☆65Updated 2 months ago