DigitalSecurity / mockleLinks
Bluetooth Low Energy Device spoofing library
☆27Updated 7 years ago
Alternatives and similar repositories for mockle
Users that are interested in mockle are comparing it to the libraries listed below
Sorting:
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- Writeups for the RHME2 CTF☆13Updated 8 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 11 years ago
- Hackmelock Android application☆17Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- Z-Wave Packet Interception and Injection Tool☆35Updated 9 years ago
- Tools and scripts for firmware reverse engeneering☆48Updated 5 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Updated 7 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆23Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Ubertooth library for Android☆40Updated 12 years ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- CVE-2017-0785 BlueBorne PoC☆40Updated 8 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Guides and scripts for vehicle cybersecurity research☆50Updated 5 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆43Updated 5 years ago