contact-discovery / rt_phone_numbersLinks
A rainbow table implementation for non-uniform inputs, such as phone numbers.
☆26Updated 3 years ago
Alternatives and similar repositories for rt_phone_numbers
Users that are interested in rt_phone_numbers are comparing it to the libraries listed below
Sorting:
- Nmap for Bluetooth Low Energy☆198Updated last year
- Apple geolocation services reverse engineering. Database scraper.☆64Updated 2 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆65Updated 4 years ago
- USBNinja Embedded Software Framework☆59Updated 6 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆116Updated 6 years ago
- Utility to glitch and dump an AirTag☆166Updated 4 years ago
- AirTag instrumentation including AirTechno and firmware downgrades.☆176Updated 7 months ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- Blue Hydra☆82Updated 8 months ago
- Voltage glitcher to bypass instructions/bootloader protections *without* target modification☆130Updated 5 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 3 years ago
- Implementation of the ciphers in iClass☆43Updated 2 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Wireshark Dissector for Apple Wireless Direct Link (AWDL) and Apple's CoreCapture logging framework. Note: the AWDL dissector is part of …☆142Updated 6 years ago
- Tools for exploiting, reverse engineering, and deploying firmware to the S3FWRN5 and S3NRN82 Samsung NFC Controllers☆100Updated 5 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- Kraken A5/1 Cracking Project Fork☆63Updated 10 years ago
- LORCON 802.11 Packet Injection Library (Mirror of Kismet repository)☆91Updated 2 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆86Updated 11 years ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆99Updated 3 years ago
- A LoRaWAN Security Evaluation Framework☆40Updated last year
- A Tamarin model and analysis of EMV☆33Updated 4 years ago
- ☆67Updated 3 years ago
- Platform independent Near Field Communication (NFC) library☆29Updated 4 years ago
- Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3☆158Updated 7 months ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆105Updated 2 years ago
- USB armory - hardware control tool☆32Updated 6 months ago