BishopFox / mellonLinks
OSDP attack tool (and the Elvish word for friend)
☆109Updated 2 years ago
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below
Sorting:
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated last month
- ☆41Updated 4 years ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 5 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Updated last month
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Updated 4 months ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated last week
- An Open-Source Door Simulator for RFID/PACS Training☆137Updated last year
- Research on the Gallagher / Cardax access control system☆67Updated 6 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆167Updated 4 months ago
- Bluetooth Security Assessment Methodology☆147Updated 2 weeks ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆45Updated 3 weeks ago
- Phone bluetooth suite that can track and prompt user notification☆17Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆87Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆46Updated last year
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Force target victim to unsafe network☆29Updated 7 months ago
- ☆37Updated 5 years ago
- Diana Credential Recovery Framework☆66Updated last week
- ☆19Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 8 months ago
- Legba recipes.☆51Updated last year
- top usernames from azure survey 2025☆14Updated 9 months ago
- Damn Vulnerable CICS Application☆29Updated last year
- A new web frontend for Hashtopolis☆41Updated last week
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆52Updated 3 years ago
- ☆82Updated 3 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Updated last month
- A public, open source physical security methodology☆47Updated last year
- ☆43Updated last year