bbaranoff / LTE-Redirection_AttackLinks
Force target victim to unsafe network
☆29Updated 6 months ago
Alternatives and similar repositories for LTE-Redirection_Attack
Users that are interested in LTE-Redirection_Attack are comparing it to the libraries listed below
Sorting:
- Our fork of Iceman's fork for Proxmark III☆17Updated 11 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆93Updated last month
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 2 months ago
- OSDP attack tool (and the Elvish word for friend)☆107Updated 2 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆82Updated last year
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆30Updated 3 weeks ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 10 months ago
- A sniffer for Bluetooth 5 and 4.x LE☆103Updated 2 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated 2 months ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 5 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 2 months ago
- DJI Drone Control Hijacking☆36Updated 2 years ago
- GUI CalypsoBTS☆36Updated 2 years ago
- ☆24Updated 3 years ago
- wsnet☆27Updated 2 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 8 months ago
- GSM Base Station on Raspberry Pi using CalypsoBTS☆27Updated last year
- A repository with UEFI research stuff☆16Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- ☆27Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆17Updated 2 years ago
- Rubber Ducky powered by NeoKey☆26Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year