Inaudible Voice Commands
☆109Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for DolphinAttack
Users that are interested in DolphinAttack are comparing it to the libraries listed below
Sorting:
- ☆13Dec 11, 2017Updated 8 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Drivers and libraries for the Xbox Kinect device on Windows, Linux, and OS X☆15Mar 9, 2020Updated 6 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆64Jan 19, 2022Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆27Apr 2, 2016Updated 9 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Provides access to PWM on the Raspberry Pi from Node.js☆26Oct 11, 2021Updated 4 years ago
- WordPress <= 5.3.? DoS☆24Dec 17, 2019Updated 6 years ago
- Magspoof R3 - Wireless magnetic stripe emulator☆69Oct 25, 2018Updated 7 years ago
- Extract transform load CLI tool for extracting small and middle data volume from sources (databases, csv files, xls files, gspreadsheets)…☆11Mar 1, 2026Updated last week
- Red Team Resources☆60Dec 27, 2018Updated 7 years ago
- Framework and command-line tool to scan SSL enabled services☆35Feb 21, 2016Updated 10 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- Jira未授权SSRF漏洞☆31Sep 30, 2019Updated 6 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- 🔪 System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.☆73Dec 8, 2022Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆11Apr 20, 2020Updated 5 years ago
- ☆13May 22, 2024Updated last year
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- The official code of our paper: "Save the Tiny, Save the All: Hierarchical Activation Network for Tiny Object Detection" (TCSVT).☆17May 9, 2024Updated last year
- CosmosDB SQL-API client for Dart☆11Feb 24, 2026Updated 2 weeks ago
- A Go client library and CLI for accessing the API of Teedy.☆10Feb 4, 2022Updated 4 years ago
- ☆20Sep 10, 2015Updated 10 years ago
- Audio library for modelling loudness☆40Aug 8, 2019Updated 6 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Nov 14, 2017Updated 8 years ago
- A javascript network simulator for the disaster.radio routing protocol☆35Sep 7, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- arduino library for remote controling V.A.G. radios☆11Mar 15, 2021Updated 4 years ago
- JavaScript library for misspelling and modifying text to make it seem like it was written by a stereotypical "bimbo", or to make the text…☆12Mar 14, 2023Updated 2 years ago