DarkWolf-Labs / ft-crackLinks
☆19Updated last year
Alternatives and similar repositories for ft-crack
Users that are interested in ft-crack are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆167Updated 4 months ago
- A simulation of the RFCTF KOTH game.☆10Updated 5 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated this week
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆46Updated last year
- Signal Tracking & Detection☆20Updated last month
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Updated last month
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆87Updated last year
- Skinny Research and Development LoRa Scanner Utility☆21Updated last year
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 5 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- ☆11Updated 5 years ago
- Force target victim to unsafe network☆29Updated 7 months ago
- A sniffer for Bluetooth 5 and 4.x LE☆108Updated 3 months ago
- uses the atom gps kit to wardrive and give status via the leds☆27Updated 2 years ago
- ☆41Updated 4 years ago
- ☆28Updated 2 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆97Updated 2 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated last month
- Still point in moving world.☆49Updated 3 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- DJI Drone Control Hijacking☆41Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- ☆20Updated last year
- A public, open source physical security methodology☆47Updated last year
- top usernames from azure survey 2025☆14Updated 8 months ago
- WHAD-enabled firmware for nRF52840 dongle, allowing to sniff and inject packets from multiple wireless protocols (e.g. BLE, Zigbee, Enha…☆42Updated this week
- ☆10Updated 3 weeks ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 8 months ago
- The BUSSide Badge☆48Updated 3 years ago