mazda_getInfo
Infotainment exploit
Demonstrates how a USB port can be exploited to access a car's infotainment system
A PoC that the USB port is an attack surface for a Mazda car's infotainment system and how Mazda hacks are made
157 stars
17 watching
37 forks
Language: Shell
last commit: over 2 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Reverse engineering results and resources for automotive security research | 85 |
| Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 826 |
| A proof of concept exploit demonstrating a vulnerability in Android's SELinux implementation | 960 |
| A proof-of-concept demonstrating a covert channel for command and control (C&C) and data exfiltration using AWS GuardDuty in a post-DNS era | 2 |
| Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access | 26 |
| Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |
| Detects unauthorized physical access to laptops and alerts the user. | 296 |
| Reproducing car hacking research for understanding CAN bus vulnerabilities in automotive systems | 52 |
| A resource for understanding hardware hacking concepts and techniques in an easily digestible format. | 147 |
| Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
| A ZSH plugin that displays the OpenShift environment information in the terminal | 1 |
| A Python-based framework for automating CAN Bus vulnerability testing and exploitation | 130 |
| A proof of concept project demonstrating the vulnerability of TLS protocols to the BEAST attack | 72 |
| A proof-of-concept demonstrating the vulnerability of unsecured containers to privilege escalation attacks | 12 |
| Automates subdomain discovery and analysis with focus on takeover detection | 370 |