BishopFox / mellon
OSDP attack tool (and the Elvish word for friend)
☆99Updated last year
Alternatives and similar repositories for mellon:
Users that are interested in mellon are comparing it to the libraries listed below
- ☆39Updated 3 years ago
- Research on the Gallagher / Cardax access control system☆65Updated 5 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆17Updated 5 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆46Updated 8 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 5 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆28Updated last year
- An Open-Source Door Simulator for RFID/PACS Training☆123Updated 5 months ago
- A public, open source physical security methodology☆46Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 7 months ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
- Neuviks Terraform Red Team Workshop☆13Updated 4 months ago
- .sub files for the LED bracelets distributed at DEFCON☆16Updated 7 months ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- ☆27Updated last year
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Updated 2 years ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆32Updated last week
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Updated 10 months ago
- DEFCON 31 slide deck and video link☆60Updated 10 months ago
- ☆41Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆38Updated 3 months ago
- Detect & filter duplicate hashcat rules☆43Updated 3 months ago
- Script to perform some hashcracking logic automagically☆71Updated 11 months ago
- uses the atom gps kit to wardrive and give status via the leds☆26Updated last year
- ☆20Updated 5 months ago
- Wiegand data logger, replay device and micro door-controller☆13Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆12Updated this week
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- Force target victim to unsafe network☆20Updated last week
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 8 months ago