Xyl2k / TSA-Travel-Sentry-master-keys
3D reproduction of TSA Master keys
☆3,165Updated 2 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys:
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆3,983Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,326Updated 6 years ago
- Advanced CPU-based password recovery utility☆2,142Updated 2 years ago
- Wannacry in-memory key recovery☆1,081Updated 7 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,716Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,107Updated 8 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,921Updated 8 years ago
- Acts like FuckAdBlock.js but always says that no adblock was detected☆1,258Updated 7 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆908Updated 7 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,007Updated 9 years ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- The USG is Good, not Bad☆404Updated 5 years ago
- Uses WiFi signals and machine learning to predict where you are☆5,126Updated last year
- 🔑🔥📈 Next Level PGP☆3,476Updated 6 years ago
- an open source ransomware honeypot☆900Updated 9 years ago
- search key to restore petya encrypted mft☆614Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,247Updated 8 years ago
- ☆1,928Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,253Updated 3 years ago
- A demo of overriding what's in a person's clipboard☆1,427Updated last year
- A simple demo of phishing by abusing the browser autofill feature☆1,485Updated 3 years ago
- Automated wanadecrypt with key recovery if lucky☆789Updated 7 years ago
- ultrafast single TCP packet audio/visual experience☆1,404Updated 7 months ago
- Key and Lock Decoding Tools☆1,132Updated 4 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,584Updated 6 months ago
- GPU-based Onion Hash generator☆1,257Updated 4 years ago
- U2F USB token optimized for physical security, affordability, and style☆2,435Updated 2 years ago
- Uses some known methods that attempt to minimize tracking in Windows 10☆4,966Updated 4 years ago
- %%30%30 Game: Don't touch the trees! (Thanks, Chrome dev team!)☆1,507Updated 9 years ago