Xyl2k / TSA-Travel-Sentry-master-keysLinks
3D reproduction of TSA Master keys
☆3,228Updated 3 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
Sorting:
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,080Updated 3 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,117Updated 8 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,744Updated 9 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,566Updated last year
- [ab]using Unicode to create tragedy☆3,748Updated 2 years ago
- WarBerryPi - Tactical Exploitation☆2,225Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,419Updated 7 years ago
- an open source ransomware honeypot☆904Updated 9 years ago
- U2F USB token optimized for physical security, affordability, and style☆2,457Updated 3 years ago
- website that irrevocably deletes itself once indexed☆1,326Updated 5 months ago
- Tunneling Internet traffic over Facebook chat.☆1,295Updated 9 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Using speech-to-text to fully check out during con calls☆2,093Updated 6 years ago
- Roleplay as the NSA by making creepy graphs of your friends☆1,301Updated 7 years ago
- A demo of overriding what's in a person's clipboard☆1,431Updated last year
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,601Updated 6 months ago
- ☆1,330Updated 2 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆939Updated 3 years ago
- Sniffing browser history using HSTS☆936Updated 8 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,333Updated 8 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,643Updated last year
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,335Updated 6 years ago
- 🔑🔥📈 Next Level PGP☆3,475Updated 6 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,019Updated 10 years ago
- Acts like FuckAdBlock.js but always says that no adblock was detected☆1,256Updated 8 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆657Updated 8 months ago
- repository for keys and key accessories☆145Updated 10 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,919Updated 8 years ago
- Tap live cabling for inspection and injection☆514Updated 7 years ago
- GPU-based Onion Hash generator☆1,267Updated 5 years ago