BishopFox / zigdiggityLinks
A ZigBee hacking toolkit by Bishop Fox
☆287Updated 4 years ago
Alternatives and similar repositories for zigdiggity
Users that are interested in zigdiggity are comparing it to the libraries listed below
Sorting:
- Penetration testing framework for ZigBee security research.☆119Updated 8 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆117Updated 7 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Updated last year
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Updated 11 years ago
- ☆106Updated 10 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆108Updated 2 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Updated 8 years ago
- scapy-radio (from original Hg repo)☆89Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Updated 7 years ago
- List of the tools and usage☆234Updated 7 months ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆162Updated 4 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- USBNinja Embedded Software Framework☆60Updated 7 years ago
- ☆130Updated 3 years ago
- Multipurpose Breakout for the FT232H☆95Updated 2 years ago
- ☆135Updated 6 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆311Updated 9 months ago
- A tool for processing a lot of pcaps using tshark☆155Updated 2 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Updated 2 years ago
- This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or …☆181Updated 2 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆100Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- A Software Defined Radio Attack Tool☆545Updated last year
- RFQuack: the versatile RF-analysis tool that quacks!☆95Updated 3 years ago
- ☆43Updated 9 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Updated 5 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- ☆124Updated 9 years ago