ThomasRinsma / pyxdl
Python implementation of the XDL protocol
☆11Updated 2 years ago
Alternatives and similar repositories for pyxdl:
Users that are interested in pyxdl are comparing it to the libraries listed below
- NFC MiTM made with two PN532 readers and a Raspberry PI. Created by Aleksei Stennikov.☆53Updated 3 years ago
- Script de BruteForce em dispositivos móveis Android com senha PIN de 4 dígitos.☆15Updated 3 years ago
- A non-exhaustive list of hacktools related to EMV fraud☆58Updated 3 years ago
- Javascript keylogger with web panel☆16Updated last year
- ☆13Updated 5 years ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆15Updated this week
- Discord bot using the cryptography toolkit of SkeletonKey☆11Updated 5 months ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- Material do curso de Hardware Hacking da ACADITI☆23Updated 5 years ago
- Arduino Leonardo compatible PHUKD library☆13Updated 6 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Updated 7 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆43Updated 9 years ago
- Build repo from Universal Wifi pineapple hardware cloner☆78Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆23Updated 9 months ago
- Organizar documentos sobre OSINT feitos em pt-br☆18Updated last year
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆31Updated last year
- A centralized place to collect USB Ninja payloads☆17Updated 6 years ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆46Updated 3 years ago
- A bitcoin block miner using esp8266☆15Updated 3 years ago
- A Simple RedLineStealer☆12Updated last year
- Public Exploits☆10Updated 4 years ago
- A simple guide of how to use a BADUSB clone to work with rubber ducky scripts☆78Updated 3 years ago
- Generate HID attack strings for Kali Nethunter☆12Updated 10 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆11Updated this week
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆208Updated 9 months ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆50Updated 2 years ago
- Evil Crow Cable Wind device☆77Updated this week
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 3 months ago