zxsecurity / NMEAdesyncLinks
A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences
☆26Updated 8 years ago
Alternatives and similar repositories for NMEAdesync
Users that are interested in NMEAdesync are comparing it to the libraries listed below
Sorting:
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆33Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆55Updated 6 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆13Updated 8 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- ☆16Updated 9 years ago
- stuff from my ToorCon 2015 talk☆15Updated 10 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 7 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Updated 9 years ago
- ☆52Updated 3 weeks ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Updated 12 years ago
- Format string exploit generation☆10Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 11 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Updated 8 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ANWI - All New Wireless IDS☆28Updated last month
- A USB armory based USB sandbox☆21Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- Magnetic stripe spoofer implementing audio waves.☆40Updated 9 years ago
- Phishing Toolkit☆19Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago