RFID Security Audit Tool
☆28Sep 2, 2014Updated 11 years ago
Alternatives and similar repositories for RadioEye
Users that are interested in RadioEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Aug 21, 2014Updated 11 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- i18n extension for Python Markdown☆13Oct 25, 2021Updated 4 years ago
- ☆27Oct 8, 2016Updated 9 years ago
- ☆15Mar 24, 2015Updated 10 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Various generic decorators for Nevolution☆17Mar 4, 2020Updated 6 years ago
- BSoD PoC for CVE-2016-0051 (MS-016)☆10Feb 22, 2016Updated 10 years ago
- A fast tunnel proxy that helps you bypass firewalls☆23Dec 14, 2014Updated 11 years ago
- run istoreos in docker as transparent bridge☆20Nov 9, 2024Updated last year
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- DINP中用于制作base image的Dockerfile☆13Feb 8, 2015Updated 11 years ago
- docker images☆13Oct 23, 2017Updated 8 years ago
- ASUSWRT Source Code (RT-AC68U)☆12Oct 24, 2015Updated 10 years ago
- ☆12May 3, 2017Updated 8 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Audio/Video Codec in WebAssembly☆25Aug 9, 2020Updated 5 years ago
- A simple ESP32 based WiFi detector that assists when jamming efforts may be attempted☆33Sep 15, 2023Updated 2 years ago
- Hardware abstraction layer for HackRF software-defined radio☆14Feb 4, 2017Updated 9 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- ☆11Aug 26, 2014Updated 11 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆55Sep 9, 2016Updated 9 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Reads FFXIV process memory and finds the stats page of people in your party☆12Apr 14, 2018Updated 7 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆15Sep 16, 2020Updated 5 years ago
- Hardware and software for smartphone sensor peripherals using the audio jack interface.☆13Jan 10, 2014Updated 12 years ago
- 一款支持微信和QQ、UC手机浏览器的分享工具,可以自定义标题、链接、icon等☆12Apr 19, 2018Updated 7 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- FMesh is a Meshtastic TUI chat interface for text-mode consoles.☆15Apr 15, 2025Updated 11 months ago
- SpeechJammer inhibits speech on the user, thanks to the Delayed Auditory Feedback effect. To put it briefly, the effect occurs when you h…☆18Nov 7, 2014Updated 11 years ago
- Delay loading images.☆17Mar 25, 2019Updated 6 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago