duraki / jeepLinks
Hacking your car like in movies
☆14Updated 3 years ago
Alternatives and similar repositories for jeep
Users that are interested in jeep are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- Ultimate CAN Bus tool for Car hacking. Full Featured hardware & software.☆44Updated 8 years ago
- Automated Script For Hacking Into CAN Bus - Car Hacking☆134Updated 4 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- A vehicle network analysis and attack tool.☆18Updated 2 years ago
- ☆53Updated 8 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- The CAN Injection Toolkit☆289Updated 6 months ago
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- car hacking tools☆105Updated last year
- quick and dirty canbus h4xing framework☆145Updated last year
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Updated 4 years ago
- A small repository of code and snippets for the Car Hacker's Manual☆83Updated 10 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆30Updated 4 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Updated 4 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆14Updated 4 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Updated 6 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Updated 6 years ago
- ☆26Updated 3 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆149Updated 6 years ago
- ☆17Updated 6 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆90Updated 7 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆67Updated 4 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Updated 11 years ago
- Radio Signals Recognition Manual☆27Updated 2 years ago
- ESP8266 ROM Bootloader utility☆12Updated 5 years ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆46Updated 3 years ago
- NFC/RFID Card Catcher or skimmer, call it whatever you want.☆70Updated 10 years ago