BishopFox / mellonLinks
OSDP attack tool (and the Elvish word for friend)
☆101Updated last year
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below
Sorting:
- ☆39Updated 3 years ago
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆47Updated 9 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆17Updated 6 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 5 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆28Updated last year
- A public, open source physical security methodology☆46Updated last year
- Phone bluetooth suite that can track and prompt user notification☆17Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 7 months ago
- .sub files for the LED bracelets distributed at DEFCON☆16Updated 8 months ago
- An Open-Source Door Simulator for RFID/PACS Training☆125Updated 6 months ago
- Bluetooth Security Assessment Methodology☆129Updated last year
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆33Updated last week
- Collection of FCC IDs for car keyfobs☆47Updated last month
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Updated 11 months ago
- ☆27Updated last year
- Script to perform some hashcracking logic automagically☆71Updated last year
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Force target victim to unsafe network☆20Updated this week
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆61Updated 2 weeks ago
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆38Updated 4 months ago
- Team hashcat event writeups and tools☆49Updated 8 months ago
- Neuviks Terraform Red Team Workshop☆13Updated 5 months ago
- Purpose-built Red Team network hardware implant made from common components.☆22Updated 2 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆77Updated 7 months ago
- DEFCON 31 slide deck and video link☆61Updated 11 months ago