bgraydon / keyspaceLinks
Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.
☆32Updated 5 years ago
Alternatives and similar repositories for keyspace
Users that are interested in keyspace are comparing it to the libraries listed below
Sorting:
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- ☆47Updated 5 years ago
- Wiegand data logger, replay device and micro door-controller☆14Updated last year
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- ☆40Updated 3 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18Updated 5 years ago
- Record video live to a server you control, just for fun or in case you need to collect evidence and don't want it just on your device or …☆43Updated 4 years ago
- iClass / Picopass tool for libnfc☆59Updated 4 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆67Updated 4 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Updated 3 years ago
- Global key for HID iCLASS☆41Updated 8 years ago
- Library and applications for interfacing with eidc32 and intelli-m☆13Updated 4 years ago
- THC "R U There" network discovery tool☆29Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Effective filter to prevent weak passwords. Tests actual attacks used by crackers.☆19Updated 9 months ago
- Analyses wifi probes (from mobile phones etc) and looks them up on wigle to provide possibly commonly visited locations of people near yo…☆29Updated 3 months ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated this week
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆62Updated 9 years ago
- The BUSSide Badge☆48Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- Silly proof-of-concept for a PDF chatroom☆21Updated 2 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated 2 weeks ago
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago