akacastor / noobLinks
Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.
☆20Updated 9 years ago
Alternatives and similar repositories for noob
Users that are interested in noob are comparing it to the libraries listed below
Sorting:
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Python-Based Tool for finding intermittent radio waveforms within IQ files☆19Updated 5 years ago
- SAVIORBURST☆21Updated 9 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- A feedhunter's visualisation tool.☆16Updated 10 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- ☆16Updated 6 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- A Facedancer21 expansion board for the BeagleBone.☆23Updated 11 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 4 months ago
- An RFC 4326 interface for GNU Radio☆15Updated 3 years ago
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- Windows Installation Diff Tool☆10Updated 9 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Updated 11 years ago
- Scan for signal peaks with RTL-SDR☆34Updated 12 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Add UART and LCD 1602 to HACKRF.☆14Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆28Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆36Updated 8 years ago
- ☆10Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 8 years ago
- Passive SDR analysis of goTenna packets with scapy☆37Updated 3 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago