brandonlw / bloxy
Bluetooth Proxy
☆15Updated 12 years ago
Alternatives and similar repositories for bloxy:
Users that are interested in bloxy are comparing it to the libraries listed below
- A collection of Teensy 2.0 (C) and PC (C#) files allowing on-the-fly simulation of USB peripherals from a PC.☆48Updated 12 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce☆9Updated 7 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆26Updated 8 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 5 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆43Updated 9 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Small and cheap standalone USB sanitizer☆42Updated 3 years ago
- ☆49Updated 8 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 5 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 3 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆17Updated 11 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆20Updated 6 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆32Updated 2 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 8 years ago
- USB reverse engineering utils (capture / replay / e.t.c.)☆51Updated 2 years ago
- ☆10Updated 7 years ago
- Quickly Change Your MAC Address in OSX to a Random Address.☆13Updated 9 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- ☆39Updated 6 years ago
- Python simulation of "rolljam" attacks☆17Updated 2 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13Updated 8 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 5 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 9 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- Python interface for the MSR605 magnetic card reader☆18Updated 10 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆39Updated 6 years ago