UberKitten / barcOwnedLinks
#CyberBarcode
☆67Updated last year
Alternatives and similar repositories for barcOwned
Users that are interested in barcOwned are comparing it to the libraries listed below
Sorting:
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Wiegotcha: Long Range RFID Thief☆237Updated 4 years ago
- A tool for processing a lot of pcaps using tshark☆153Updated 2 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆53Updated 8 years ago
- Bypass captive portals by impersonating inactive users☆77Updated 10 years ago
- ☆147Updated 9 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- A Passive RFID fuzzer☆78Updated 2 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- ☆47Updated 5 years ago
- Big Iron Recon & Pwnage☆125Updated 4 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆160Updated 4 years ago
- A ZigBee hacking toolkit by Bishop Fox☆287Updated 4 years ago
- Rogue AP killer☆92Updated 7 years ago
- Reticle is a C&C network for small devices that want to be friends.☆90Updated 11 years ago
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- Evil client portion of EAP relay attack☆206Updated 2 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆36Updated 6 years ago
- Tool to read and write iclass cards without the master key☆107Updated 6 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 11 months ago
- For importing, searching, and managing public password breach data☆161Updated 2 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Graph visualization of wireless client and access point relationships☆117Updated 2 years ago
- Private keys that have become public ...☆184Updated this week
- Gets in the way of your victim's traffic and out of yours☆28Updated 6 years ago
- 3D reproduction of TSA Master keys☆71Updated 3 years ago