Xyl2k / TSA-Travel-Sentry-master-keysLinks
3D reproduction of TSA Master keys
☆3,177Updated 3 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
Sorting:
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,032Updated 3 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,114Updated 8 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,529Updated last year
- [ab]using Unicode to create tragedy☆3,746Updated last year
- OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy☆866Updated 4 years ago
- website that irrevocably deletes itself once indexed☆1,321Updated 10 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,359Updated 6 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,735Updated 8 years ago
- Code+CAD data for tempescope☆332Updated 3 years ago
- Acts like FuckAdBlock.js but always says that no adblock was detected☆1,258Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,250Updated 8 years ago
- Private messaging system that hides metadata☆2,482Updated 5 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,262Updated 11 months ago
- Run a script when one or more sensors fail.☆873Updated 8 years ago
- an open source ransomware honeypot☆901Updated 9 years ago
- U2F USB token optimized for physical security, affordability, and style☆2,439Updated 2 years ago
- WarBerryPi - Tactical Exploitation☆2,221Updated 5 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,615Updated 9 months ago
- Free HTTPS certificates without having to trust the letsencrypt cli with sudo/root☆1,183Updated 5 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,919Updated 8 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,014Updated 9 years ago
- End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)☆4,135Updated 2 years ago
- *This project is no longer actively maintained. If you'd like to become the maintainer, please let us know.* ZeroDB is an end-to-end encr…☆1,556Updated 7 years ago
- Sniffing browser history using HSTS☆933Updated 7 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆361Updated 9 years ago
- Advanced CPU-based password recovery utility☆2,149Updated 2 years ago
- Tunneling Internet traffic over Facebook chat.☆1,292Updated 9 years ago
- A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless o…☆1,761Updated 7 years ago
- Key and Lock Decoding Tools☆1,147Updated 4 years ago