Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).
☆17Jan 12, 2021Updated 5 years ago
Alternatives and similar repositories for Wireless-Master-Key
Users that are interested in Wireless-Master-Key are comparing it to the libraries listed below
Sorting:
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- Java Card applet with REFRESH command support for SIM Toolkit application☆17Aug 2, 2020Updated 5 years ago
- Software emulation of the Target BluEye emergency services alert system☆30Mar 11, 2016Updated 10 years ago
- RadioSniffer 433/315 MHz☆20Dec 5, 2021Updated 4 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- NodeMCU ESP8266 CC1101 Sub1GHz OOK transmitter & brute forcer w/ pre-saved signals (e.g. TouchTunes Jukebox)☆17Jul 22, 2021Updated 4 years ago
- Remote Keyless Entry Systems☆18Mar 26, 2017Updated 8 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Simple Arduino project to detect RF jammers for a couple of bucks☆18Aug 1, 2019Updated 6 years ago
- ESP32 PS/2 emulator☆15Jan 11, 2020Updated 6 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Jackpot is the easiest way to get paid using ruby.☆78Aug 24, 2013Updated 12 years ago
- This is a repository that helps you setup surfshark's wireguard on openwrt and other linux devices☆12Oct 30, 2022Updated 3 years ago
- A simple one wire touch application for Arduino or any atmega board☆11Feb 18, 2015Updated 11 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Disassembly Generation and Processing for JARV1S☆15Jul 15, 2025Updated 8 months ago
- This is a read-only mirror of the CRAN R package repository. surveillance — Temporal and Spatio-Temporal Modeling and Monitoring of Epi…☆11Jun 25, 2025Updated 8 months ago
- ☆11Feb 3, 2026Updated last month
- Dumps from a collection of hotel room keys for analysis☆13Oct 19, 2020Updated 5 years ago
- ☆10Mar 30, 2015Updated 10 years ago
- ☆12Updated this week
- CRC Tool Kit☆18Oct 5, 2012Updated 13 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆18Jun 12, 2020Updated 5 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- TS3Tunnel is a proof of concept showing how easy it is to spy on the private audio communications of the TeamSpeak 3 users without anyone…☆13Nov 30, 2018Updated 7 years ago
- ☆14May 14, 2022Updated 3 years ago
- https://github.com/aligungr/UERANSIM☆10Apr 23, 2021Updated 4 years ago
- Cryptonita - cryptanalysis swiss army knife☆14Jan 24, 2026Updated last month
- The ESL project of furrtek, with board, apk and hex files☆14Aug 8, 2019Updated 6 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆11Dec 18, 2022Updated 3 years ago
- A GNU Radio on-off keying transmitter☆14Sep 13, 2019Updated 6 years ago
- ECE 209 Security of Embedded Systems Project☆16Mar 17, 2018Updated 8 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- ☆13Dec 6, 2020Updated 5 years ago