zxsecurity / NMEAdesyncLinks
A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences
☆26Updated 8 years ago
Alternatives and similar repositories for NMEAdesync
Users that are interested in NMEAdesync are comparing it to the libraries listed below
Sorting:
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- ☆13Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- Format string exploit generation☆10Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- ☆15Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 6 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆28Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 12 years ago
- ☆48Updated last month
- ☆24Updated 10 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Automatically exported from code.google.com/p/modscan☆28Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago