waldo-irc / IOTToolkitLinks
☆40Updated 4 years ago
Alternatives and similar repositories for IOTToolkit
Users that are interested in IOTToolkit are comparing it to the libraries listed below
Sorting:
- An arduino UARTFuzzer☆47Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 10 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 7 months ago
- Tools for ESP32 firmware dissection☆39Updated last year
- Content related to hardware hacking☆53Updated 6 years ago
- USB testing made easy☆115Updated 2 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- A vehicle network analysis and attack tool.☆114Updated 3 years ago
- JFFS2 filesystem extraction tool☆72Updated 5 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆78Updated 8 months ago
- Reverse engineering the TI AM3358 boot ROM☆53Updated 10 months ago
- Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera☆85Updated 8 months ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆30Updated 4 months ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated 5 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆23Updated 2 years ago
- Exploit development and reversing of Hichip's P2P camera firmware☆36Updated 3 years ago
- USBNinja Embedded Software Framework☆59Updated 6 years ago
- ☆123Updated last year
- 基于 SDR 开源方案& 商业授权方案 实现 2-5G 安全研究的一些资源整合☆109Updated last month
- Guide for USBNinja☆46Updated 6 years ago
- quick and dirty canbus h4xing framework☆140Updated 9 months ago
- A vehicle network analysis and attack tool.☆17Updated 2 years ago
- ☆16Updated 6 years ago
- A tool that bypasses PN553 signature protection☆50Updated last year
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆52Updated 5 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆71Updated last year
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago