AdamLaurie / satmapLinks
A feedhunter's visualisation tool.
☆16Updated 10 years ago
Alternatives and similar repositories for satmap
Users that are interested in satmap are comparing it to the libraries listed below
Sorting:
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆28Updated 9 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆21Updated 9 years ago
- kalibrate-bladeRF☆51Updated 4 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- SAVIORBURST☆22Updated 9 years ago
- RF retroreflectors☆100Updated 9 years ago
- Airprobe for frequency hopping GSM channels☆30Updated 11 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 7 months ago
- SimBrush - SIM data carver and wrapper☆21Updated 13 years ago
- Scripts for creating GNU Radio Live SDR Environment.☆29Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆22Updated 9 years ago
- Kraken A5/1 Cracking Project Fork☆63Updated 10 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Updated 11 years ago
- ☆39Updated 10 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆78Updated 8 years ago
- Magnetic Pentesting tool for Raspberry Pi☆61Updated 5 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆51Updated 7 years ago
- Password analysis software☆37Updated 10 years ago
- Slides and code from "So You Want to Hack Radios", as presented by @marcnewlin and @matt-knight at ShmooCon 2017.☆74Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A5/3 Call Encryption Library☆31Updated 9 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆94Updated 5 years ago
- USB armory Debian base image☆82Updated 3 weeks ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆106Updated 9 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Cheatsheet for gnuradio☆35Updated 7 years ago