zj3t / Automotive-vulnerabilitiesView external linksLinks
☆15Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for Automotive-vulnerabilities
Users that are interested in Automotive-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆32Updated this week
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 4 months ago
- ☆18Aug 5, 2020Updated 5 years ago
- Read only mirror - No pull requests☆20May 7, 2021Updated 4 years ago
- Automotive Security Toolkit☆24Updated this week
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Jul 6, 2023Updated 2 years ago
- ☆38May 31, 2024Updated last year
- ☆32Jul 27, 2020Updated 5 years ago
- Autosuite:an open source multi-protocol low-cost vehicle bus testing framework☆42Aug 21, 2023Updated 2 years ago
- Software for the QO-100 groundstation of EA4GPZ☆10Aug 8, 2022Updated 3 years ago
- A Macro WITH GUI to automatically add and remove friends in the Pokémon TCG Pocket game. Available in 🇺🇸 En-Us, 🇧🇷 Pt-Br and 🇪🇸 Es-…☆13Feb 4, 2025Updated last year
- 自动投喂器使用了AI技术:人工智能模型实现的图像识别功能对识别对象进行判断。如果是某 一种动物,将会投喂相应的食物,该项目中提到的机器可以用于动物养殖和宠物饲养。该机器节省时间、经济。对养殖饲养有很大帮助。☆11Oct 30, 2023Updated 2 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- ☆27Jun 17, 2025Updated 7 months ago
- ECP5 FPGA DEV BOARD☆10Apr 19, 2021Updated 4 years ago
- Playing with (real?) audio beacon and xtracking devices☆12Nov 4, 2018Updated 7 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- Artifact evaluation of paper: MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation☆49Apr 22, 2025Updated 9 months ago
- Direction Of Arrival (DOA) simulation tools with Nec2☆13Apr 24, 2017Updated 8 years ago
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- Code for running forward and backward versions of GPT2☆10Nov 20, 2021Updated 4 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- A curated collection of papers and related projects on using LLMs for privacy.☆22Oct 8, 2025Updated 4 months ago
- ☆25Sep 17, 2025Updated 4 months ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- Automated Deployment for MobileInsight Development Environment☆10Dec 19, 2020Updated 5 years ago
- Bit-banged MIPI RFFE control library developed for STM32 HAL platforms☆13May 3, 2019Updated 6 years ago
- ☆42Feb 9, 2023Updated 3 years ago
- Source code for paper "Breaking Security-Critical Voice Authentication".☆13Jul 10, 2023Updated 2 years ago
- USBRelay Development libraries external usage☆11Mar 1, 2016Updated 9 years ago
- A software development toolkit for signal processing which uses blocks☆15Updated this week
- ☆15Sep 24, 2024Updated last year
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Public Cybersecurity Research & Advisories☆21Jan 12, 2026Updated last month
- ☆12May 6, 2020Updated 5 years ago