Amit Vitekar's repositories
diafuzzer
Diameter fuzzer, based on specifications of Diameter applications following rfc 3588 / 6733
fernly
Fernvale research OS
hexag00n
Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)
jss7-attack-simulator
SS7 Attack Simulator based on RestComm's jss7
LTE
fork from https://git.networks.imdea.org/nicola_bui/imdeaowl (仅为备份使用,如有侵权,可联系删除)
MediaTek-HelioX10-Kernel
MediaTek MT6795 (Helio X10) kernel source code
nogaxeh
Tools for analyzing hexagon code
openphy
OpenPHY - Real-time over-the-air LTE signal decoding tool
proxygambit
Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced resurrection of ProxyHam)
sboot_dump
A tool to dump RAM using S-Boot Upload Mode
shannonRE
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
sim-password-manager
SIM Password Manager
simLAB
Smartcard editor and SIM/SAT simulator
SmsFuzzer
Send Pdu sms (SILENT FLASH or NORMAL)
U-SIMonitor
The U-SIMonitor is an application for Android that performs AT-commands to the baseband modem of mobile phones. It can obtain the security credentials and sensitive information of the cellular technology, such as permanent and temporary identities, encryption keys, location of users, etc. Alternatively, it can be used to evaluate the security of mobile operators by analyzing how frequently the keys are refreshed or how often the termorary identities are updated. U-SIMonitor does not disrupt the normal operation of the phone while it is running.