Merge pull request #258 from meitar/at-commands

Add "AT Commands" Python scripts for exploiting Android devices.
This commit is contained in:
Samar Dhwoj Acharya 2018-11-03 15:07:07 -05:00 committed by GitHub
commit 2165117198
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -494,6 +494,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
* [WiFi Pineapple](https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform.
* [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
* [PCILeech](https://github.com/ufrisk/pcileech) - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
* [AT Commands](https://atcommands.org/) - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
### Side-channel Tools