Xyl2k / TSA-Travel-Sentry-master-keys
3D reproduction of TSA Master keys
☆3,169Updated 2 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
Sorting:
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,109Updated 8 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,348Updated 6 years ago
- Advanced CPU-based password recovery utility☆2,149Updated 2 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,012Updated 2 years ago
- an open source ransomware honeypot☆901Updated 9 years ago
- WarBerryPi - Tactical Exploitation☆2,222Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,503Updated 7 years ago
- [ab]using Unicode to create tragedy☆3,745Updated last year
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,009Updated 9 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- Sniffing browser history using HSTS☆935Updated 7 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆4,952Updated 3 weeks ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Library and command line tool to detect SHA-1 collision in a file☆1,355Updated 9 months ago
- Roleplay as the NSA by making creepy graphs of your friends☆1,302Updated 7 years ago
- ☆3,407Updated 4 months ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,603Updated 7 months ago
- No Coin is a tiny browser extension aiming to block coin miners such as Coinhive.☆1,585Updated 4 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,227Updated 3 years ago
- 🔑🔥📈 Next Level PGP☆3,475Updated 6 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,248Updated 8 years ago
- A demo of overriding what's in a person's clipboard☆1,429Updated last year
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,267Updated 3 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,721Updated 8 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,341Updated 8 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,920Updated 8 years ago
- End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)☆4,134Updated 2 years ago
- U2F USB token optimized for physical security, affordability, and style☆2,437Updated 2 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆930Updated 2 years ago
- Using speech-to-text to fully check out during con calls☆2,094Updated 6 years ago