deptofdefense / dc30-space-jamLinks
Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur
☆19Updated 2 years ago
Alternatives and similar repositories for dc30-space-jam
Users that are interested in dc30-space-jam are comparing it to the libraries listed below
Sorting:
- A simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.☆27Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 6 years ago
- ☆26Updated last year
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Maritime Security overview☆9Updated 8 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- ☆29Updated 2 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆12Updated 3 years ago
- A simple bash script that converts pcapng capture files to Wigle compatible csv import☆11Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆17Updated 6 months ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- Force target victim to unsafe network☆23Updated last week
- cgran.org Django website☆11Updated 2 months ago
- Blind Reverse Engineering a Wireless Protocol - or - Amateur Signals Intelligence☆22Updated 10 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- A simple GNU Radio message based burst FSK Transmitter and Receiver☆12Updated 10 years ago
- A curated list of awesome resources about the security of space systems.☆61Updated 10 months ago
- OpenBTS-UMTS reloaded 2024. Compatibility with latest UHD drivers, several fixes and updated install documentation for Ubuntu 22.04☆56Updated 11 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A curated list of awesome baseband research resources☆16Updated 5 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- Still point in moving world.☆51Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆27Updated 3 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆17Updated 3 years ago
- ADDVulcan 2020 Hack-A-Sat writeups☆26Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago