BishopFox / mellon
OSDP attack tool (and the Elvish word for friend)
☆94Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mellon
- ☆38Updated 2 years ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆43Updated 3 months ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆29Updated last week
- Research on the Gallagher / Cardax access control system☆63Updated 4 years ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆28Updated 9 months ago
- An Open-Source Door Simulator for RFID/PACS Training☆107Updated last week
- DEFCON 31 slide deck and video link☆58Updated 4 months ago
- Collection of FCC IDs for car keyfobs☆42Updated last year
- A public, open source physical security methodology☆43Updated 7 months ago
- All kinds of tiny shells☆59Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆31Updated last year
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆62Updated 3 weeks ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆127Updated 8 months ago
- Neuviks Terraform Red Team Workshop☆13Updated 3 months ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆48Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 8 months ago
- Wireless Hacking Devices Protocol client☆130Updated this week
- Script to perform some hashcracking logic automagically☆65Updated 6 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆146Updated 8 months ago
- Bluetooth Security Assessment Methodology☆110Updated 5 months ago
- Evil Crow Cable Pro device☆89Updated 7 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆32Updated last month
- ☆27Updated 10 months ago
- ☆22Updated 9 months ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆13Updated 2 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆63Updated last month