BishopFox / mellonLinks
OSDP attack tool (and the Elvish word for friend)
☆100Updated last year
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 7 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆19Updated 8 months ago
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- A public, open source physical security methodology☆46Updated last year
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- ☆41Updated last year
- Force target victim to unsafe network☆26Updated last month
- ☆39Updated 3 years ago
- Still point in moving world.☆51Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆20Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆48Updated 11 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆78Updated 8 months ago
- Script to perform some hashcracking logic automagically☆72Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆41Updated 5 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 4 months ago
- Phone bluetooth suite that can track and prompt user notification☆17Updated last year
- An Open-Source Door Simulator for RFID/PACS Training☆125Updated 8 months ago
- Legba recipes.☆50Updated 10 months ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆138Updated 2 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- ☆74Updated 3 years ago
- top usernames from azure survey 2025☆14Updated 2 months ago
- karma WiFi attack implementation☆51Updated 8 months ago
- Detect & filter duplicate hashcat rules☆45Updated 6 months ago
- ☆14Updated 6 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Rewriting SIET to python3☆50Updated 9 months ago
- Diana Credential Recovery Framework☆58Updated 3 weeks ago