UmarAhmad / awesome-ibeacon
A curated list of awesome iBeacon software, libraries and use cases.
☆10Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-ibeacon
- NAT Slipstream attack code samples☆46Updated 3 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆29Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- USBNinja Embedded Software Framework☆56Updated 5 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆13Updated 2 years ago
- ☆27Updated 3 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆12Updated 3 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆11Updated 3 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 8 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆26Updated 10 months ago
- A rogue DNS detector☆23Updated last year
- Converted the text list to binary to save space☆10Updated 2 months ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆22Updated 2 years ago
- Detect jamming on ISM bands using an RTLSDR dongle and a Raspberry Pi or laptop PC☆32Updated 7 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- ☆20Updated 3 years ago
- ☆38Updated 3 years ago
- Smartcard APDU interception and MITM for one smartcard model☆37Updated 6 years ago
- Wiegand data logger, replay device and micro door-controller☆12Updated 10 months ago
- ☆12Updated 7 years ago
- SOCKS for your subnet☆16Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆14Updated 2 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- ☆20Updated 3 years ago