BatchDrake / biteyeLinks
Display bits of a binary file as pixels
☆23Updated 11 years ago
Alternatives and similar repositories for biteye
Users that are interested in biteye are comparing it to the libraries listed below
Sorting:
- Visual Interface heXadecimal dump☆52Updated 9 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago
- Airprobe for frequency hopping GSM channels☆31Updated 11 years ago
- A honeypot for malware that propagates via USB storage devices☆101Updated 10 years ago
- scripts, etc...☆37Updated last year
- RF retroreflectors☆100Updated 9 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆53Updated 11 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Slides and code from "So You Want to Hack Radios", as presented by @marcnewlin and @matt-knight at ShmooCon 2017.☆75Updated 8 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- ☆16Updated 8 years ago
- See here:☆43Updated 13 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- Python pcap sanitizer☆21Updated 3 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- Sensor software☆68Updated 4 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆119Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆140Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Scan for signal peaks with RTL-SDR☆34Updated 12 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆55Updated 6 years ago