UberKitten / barcOwnedLinks
#CyberBarcode
☆68Updated 2 years ago
Alternatives and similar repositories for barcOwned
Users that are interested in barcOwned are comparing it to the libraries listed below
Sorting:
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- ☆147Updated 9 years ago
- Big Iron Recon & Pwnage☆125Updated 4 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆53Updated 8 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated 2 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Wiegotcha: Long Range RFID Thief☆235Updated 4 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆260Updated last year
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- Database of private SSL/SSH keys for embedded devices☆268Updated last year
- ☆132Updated 6 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆36Updated 6 years ago
- Graph visualization of wireless client and access point relationships☆117Updated 2 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Rogue AP killer☆92Updated 7 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆160Updated 4 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆125Updated last year
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆55Updated 8 years ago
- Private keys that have become public ...☆184Updated 3 weeks ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago