Add "AT Commands" Python scripts for exploiting Android devices.

This commit is contained in:
Meitar M 2018-11-01 14:22:08 -04:00
parent 85b403f870
commit dcfc07e36b
No known key found for this signature in database
GPG Key ID: 07EFAA28AB94BC85

View File

@ -467,6 +467,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
* [WiFi Pineapple](https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform. * [WiFi Pineapple](https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform.
* [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more. * [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
* [PCILeech](https://github.com/ufrisk/pcileech) - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe. * [PCILeech](https://github.com/ufrisk/pcileech) - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
* [AT Commands](https://atcommands.org/) - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
### Side-channel Tools ### Side-channel Tools