chrismarget / eidc32proxyLinks
Library and applications for interfacing with eidc32 and intelli-m
☆13Updated 3 years ago
Alternatives and similar repositories for eidc32proxy
Users that are interested in eidc32proxy are comparing it to the libraries listed below
Sorting:
- ☆40Updated 3 years ago
- Random Hashcat Scrips☆32Updated 11 months ago
- Wiegand data logger, replay device and micro door-controller☆13Updated last year
- Hostile Dropboxes Management☆26Updated 5 years ago
- OSDP attack tool (and the Elvish word for friend)☆101Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 9 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- ☆11Updated 4 years ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Updated 2 years ago
- ☆39Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- ☆16Updated 8 years ago
- Random scripts for azure stuff☆12Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 9 months ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ☆18Updated 5 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- Detect & filter duplicate hashcat rules☆46Updated 8 months ago
- ☆31Updated 4 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆54Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Updated 6 years ago
- Content from THOTCON 0xa talk☆10Updated 6 years ago