Software tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters
☆96Jun 1, 2017Updated 8 years ago
Alternatives and similar repositories for nrf24-playset
Users that are interested in nrf24-playset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆435Jul 24, 2022Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Nov 18, 2019Updated 6 years ago
- LDAP Swiss Army Knife☆51Dec 5, 2023Updated 2 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆175Mar 30, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Wireless mouse/keyboard attack with replay/transmit poc☆93Jul 10, 2016Updated 9 years ago
- Gets in the way of your victim's traffic and out of yours☆27Aug 4, 2019Updated 6 years ago
- GNU Radio module and Wireshark dissector for the Nordic Semiconductor nRF24L Enhanced Shockburst protocol.☆121Sep 3, 2022Updated 3 years ago
- JackIt - Exploit Code for Mousejack☆889Oct 1, 2020Updated 5 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- FPGA-based glitcher for the Digilent Arty FPGA development board.☆31Aug 18, 2017Updated 8 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python code to interface with Nordic nRF24L01+ radio over SPI through BusPirate☆19Jul 31, 2021Updated 4 years ago
- MouseJack device discovery and research tools☆1,370Dec 19, 2017Updated 8 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Jun 30, 2021Updated 4 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- Simple STM32F103 based glitcher FW☆36May 16, 2021Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- A yet non-offical neighbor for the GreatFet One targeting the 433/868/915MHz bands☆46Sep 25, 2021Updated 4 years ago
- Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.☆731Jan 2, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- U-boot for a Ralink based SoC☆16Mar 6, 2013Updated 13 years ago
- Signet firmware and device interface library☆16Dec 30, 2021Updated 4 years ago
- 📡 On-off keying tools for your SD-arrrR☆144Feb 25, 2023Updated 3 years ago
- An Android app to read and write MIFARE Ultralight EV1 tags☆21Dec 28, 2019Updated 6 years ago
- ☆12May 3, 2017Updated 8 years ago
- AVR based ISM transciever covering 260-960MHz☆19Apr 11, 2012Updated 13 years ago
- iWar2 - The war dialer☆12Aug 29, 2017Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Voltage glitcher to bypass instructions/bootloader protections *without* target modification☆137Jul 22, 2020Updated 5 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆118Dec 5, 2018Updated 7 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- 433.92MHz OOK modulated frame replaying device☆34Jul 13, 2015Updated 10 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago