BishopFox / mellonLinks
OSDP attack tool (and the Elvish word for friend)
☆101Updated 2 years ago
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆23Updated 9 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆54Updated last month
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated 10 months ago
- ☆39Updated 3 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 6 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 8 months ago
- Force target victim to unsafe network☆26Updated 3 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated this week
- Script to perform some hashcracking logic automagically☆75Updated 3 weeks ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆39Updated this week
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- A public, open source physical security methodology☆46Updated last year
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆136Updated last year
- ☆42Updated last year
- Diana Credential Recovery Framework☆61Updated this week
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- Collection of hashcat lists and things.☆51Updated 5 years ago
- top usernames from azure survey 2025☆14Updated 4 months ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Bluetooth Security Assessment Methodology☆134Updated last year
- ☆37Updated 4 years ago
- Purpose-built Red Team network hardware implant made from common components.☆23Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆15Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆76Updated 11 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- tool for identifying guest relationships between companies☆102Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- Check robustness of your (their) Active Directory accounts passwords☆44Updated 6 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆81Updated 4 months ago