BishopFox / mellonLinks
OSDP attack tool (and the Elvish word for friend)
☆101Updated 2 years ago
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated this week
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated 10 months ago
- ☆40Updated 3 years ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆54Updated 2 months ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆48Updated last week
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 3 weeks ago
- Script to perform some hashcracking logic automagically☆74Updated last month
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- An Open-Source Door Simulator for RFID/PACS Training☆133Updated 11 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- A public, open source physical security methodology☆45Updated last year
- Legba recipes.☆49Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 7 months ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆86Updated 4 years ago
- Force target victim to unsafe network☆26Updated 4 months ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆154Updated last month
- Bluetooth Security Assessment Methodology☆136Updated last year
- Gadget IoC removal from HAK5's BashBunny☆20Updated 2 years ago
- ☆42Updated last year
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆19Updated 3 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆15Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 8 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆135Updated last year
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆40Updated last year
- top usernames from azure survey 2025☆14Updated 5 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆81Updated 11 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆15Updated last year
- ☆37Updated 5 years ago