chrismarget / eidc32proxyLinks
Library and applications for interfacing with eidc32 and intelli-m
☆13Updated 4 years ago
Alternatives and similar repositories for eidc32proxy
Users that are interested in eidc32proxy are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- ☆40Updated 3 years ago
- Random Hashcat Scrips☆32Updated last year
- Wiegand data logger, replay device and micro door-controller☆14Updated last year
- Detect & filter duplicate hashcat rules☆47Updated 9 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- ☆16Updated 8 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated 11 months ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Random scripts for azure stuff☆12Updated 3 years ago
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 2 weeks ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- ☆37Updated 5 years ago
- Top hashpwn rules☆21Updated 11 months ago
- A logging ASKPASS binary☆29Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Updated 6 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- Network Finger Printer☆16Updated 7 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 10 months ago
- ☆39Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- ☆28Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last year