azet / readnfcccLinks
Fork: https://code.google.com/p/readnfccc
☆24Updated 12 years ago
Alternatives and similar repositories for readnfccc
Users that are interested in readnfccc are comparing it to the libraries listed below
Sorting:
- Arduino library for the Nuit du Hack 2015 Badge☆13Updated 9 years ago
- WPA2 passphrase recovery tool for UPC%07d devices☆59Updated 10 years ago
- Qt Port for Linux, Mac OSX and Windows☆304Updated 3 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- Router Keygen generate default WPA/WEP keys for several routers.☆486Updated 8 years ago
- Python/Linux port of Psychson, a tool to modify firmware of Phison 2251-03 aka 2303 (BadUSB)☆15Updated 9 years ago
- Git Repo of CoWPAtty☆26Updated 10 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Updated 8 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Updated 3 years ago
- Various PoCs☆502Updated 6 years ago
- NTP Main-in-the-Middle tool☆250Updated 3 years ago
- Proof of concept for UPC UBEE router hack - WPA2 password generator☆59Updated 9 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆188Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆311Updated 4 years ago
- ☆207Updated 2 years ago
- random brain dumps☆351Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated 2 years ago
- Malicious USB☆176Updated 2 years ago
- SSLStrip version to defeat HSTS☆323Updated 8 years ago
- Hijack a Subaru's key fob and steal all the things☆374Updated 8 years ago
- Private keys that have become public ...☆185Updated this week
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆457Updated 7 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆104Updated 9 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆200Updated 9 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- Automated Linux evil maid attack☆435Updated 10 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆479Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago