BenBE / kompromat
Private keys that have become public ...
☆19Updated 2 years ago
Alternatives and similar repositories for kompromat
Users that are interested in kompromat are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated 3 months ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆26Updated 3 years ago
- OSDP attack tool (and the Elvish word for friend)☆99Updated last year
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆76Updated 6 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆47Updated 9 months ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆31Updated 3 months ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆15Updated this week
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 3 months ago
- Rubber Ducky powered by NeoKey☆23Updated 11 months ago
- A simple CUDA accelerated bruteforcer for KeeLoq algorithm☆39Updated last year
- quick and dirty canbus h4xing framework☆139Updated 6 months ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
- ☆39Updated 3 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Windows Remote Administration Tool that uses Discord as C2☆28Updated 2 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 8 months ago
- Legba recipes.☆49Updated 8 months ago
- Force target victim to unsafe network☆20Updated this week
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 3 months ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- ☆41Updated last year
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆19Updated 10 months ago
- hiding in plain sight: part 2☆44Updated 10 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆12Updated last week
- Collection of FCC IDs for car keyfobs☆47Updated last month
- zyxel_ipc_camera_pwn☆20Updated 2 years ago