duraki / jeepLinks
Hacking your car like in movies
☆14Updated 3 years ago
Alternatives and similar repositories for jeep
Users that are interested in jeep are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated last week
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated 2 weeks ago
- Ultimate CAN Bus tool for Car hacking. Full Featured hardware & software.☆44Updated 8 years ago
- Automated Script For Hacking Into CAN Bus - Car Hacking☆134Updated 4 years ago
- ☆26Updated 3 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Updated 3 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆30Updated 4 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10Updated 9 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 months ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆17Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- ☆24Updated 4 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Updated 6 years ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- OBD Parser running on Raspberry Pi Linux☆24Updated 7 years ago
- Repository of tools used in my blog☆52Updated last year
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- Mobile phone PWN tools and scripts☆15Updated 5 years ago
- ☆17Updated 6 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆149Updated 5 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Updated 3 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆66Updated 4 years ago
- The CAN Injection Toolkit☆287Updated 5 months ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Updated 4 years ago
- Bad USB collections with malicious firmware☆69Updated 10 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆19Updated 6 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 5 years ago