UberKitten / barcOwned
#CyberBarcode
☆65Updated last year
Alternatives and similar repositories for barcOwned:
Users that are interested in barcOwned are comparing it to the libraries listed below
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- Bypass captive portals by impersonating inactive users☆77Updated 10 years ago
- ☆142Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- ☆12Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆86Updated 7 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Reticle is a C&C network for small devices that want to be friends.☆89Updated 11 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆112Updated 6 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- Stargate☆94Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- Random Code, POC Scripts and other things (Your Mileage May Vary)☆89Updated 6 years ago
- rolljam☆86Updated 8 years ago
- ☆57Updated 4 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago