DarkWolf-Labs / ft-crackLinks
☆19Updated last year
Alternatives and similar repositories for ft-crack
Users that are interested in ft-crack are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆108Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last week
- Living Under the Land on Linux ~ BSides Belfast 2025☆37Updated last month
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Updated 3 months ago
- DJI Drone Control Hijacking☆38Updated 2 years ago
- top usernames from azure survey 2025☆14Updated 8 months ago
- Legba recipes.☆51Updated last year
- A user enumeration tool for Slack.☆34Updated last year
- Force target victim to unsafe network☆29Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Random Hashcat Scrips☆33Updated last year
- F5 Service Password Decryption☆29Updated 5 months ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- A simulation of the RFCTF KOTH game.☆10Updated 5 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆65Updated last month
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated 2 weeks ago
- Phone bluetooth suite that can track and prompt user notification☆17Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆45Updated 11 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 7 months ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆84Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆84Updated last year
- Our fork of Iceman's fork for Proxmark III☆17Updated last year
- Top hashpwn rules☆20Updated 2 weeks ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 3 weeks ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- ☆11Updated 5 years ago