azet / readnfcccLinks
Fork: https://code.google.com/p/readnfccc
☆24Updated 12 years ago
Alternatives and similar repositories for readnfccc
Users that are interested in readnfccc are comparing it to the libraries listed below
Sorting:
- WPA2 passphrase recovery tool for UPC%07d devices☆59Updated 10 years ago
- Qt Port for Linux, Mac OSX and Windows☆304Updated 3 years ago
- NTP Main-in-the-Middle tool☆250Updated 3 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Updated 6 years ago
- Arduino library for the Nuit du Hack 2015 Badge☆13Updated 9 years ago
- Python/Linux port of Psychson, a tool to modify firmware of Phison 2251-03 aka 2303 (BadUSB)☆15Updated 9 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Updated 8 years ago
- Try to find the password of a LUKS encrypted volume.☆274Updated last year
- Archiwum Polskiego phreakingu to projekt który ma na celu zachowanie dla potomnych roznych informacji o tym jak kiedyś za darmo dzwonili …☆148Updated 2 years ago
- Router Keygen generate default WPA/WEP keys for several routers.☆485Updated 8 years ago
- random brain dumps☆350Updated 8 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,016Updated 10 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆592Updated 3 years ago
- Various PoCs☆502Updated 6 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆140Updated 3 years ago
- SSLStrip version to defeat HSTS☆323Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- WPS related utilities☆166Updated 10 years ago
- Runes of Magic protocol analysis tools☆61Updated last year
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- Hijack a Subaru's key fob and steal all the things☆374Updated 8 years ago
- The Hacker's Sandbox☆124Updated 8 months ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆609Updated 4 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆517Updated 7 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- A Software Defined Radio Attack Tool☆545Updated last year
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 4 years ago