BishopFox / zigdiggityLinks
A ZigBee hacking toolkit by Bishop Fox
☆280Updated 3 years ago
Alternatives and similar repositories for zigdiggity
Users that are interested in zigdiggity are comparing it to the libraries listed below
Sorting:
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆114Updated 6 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆243Updated 5 months ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Penetration testing framework for ZigBee security research.☆115Updated 7 years ago
- scapy-radio (from original Hg repo)☆86Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆161Updated 7 years ago
- ☆106Updated 9 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆104Updated 2 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆85Updated 11 years ago
- ☆122Updated 2 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- ☆127Updated 6 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆88Updated 7 years ago
- List of the tools and usage☆234Updated last week
- An Android app that lets you use your access control card cloning devices in the field.☆462Updated 5 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆258Updated last year
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆93Updated 5 years ago
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- Multipurpose Breakout for the FT232H☆95Updated last year
- A Software Defined Radio Attack Tool☆540Updated 6 months ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆299Updated 3 months ago
- Proof-of-concept of the KRACK attack against Linux and Android☆153Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Mousejack for ATmega32u4☆217Updated 2 years ago
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or …☆179Updated 2 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 8 months ago
- Notes and resorce's for SDR/Wireless tech☆178Updated 3 months ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago