ervanalb / lensLinks
Tap live cabling for inspection and injection
☆515Updated 7 years ago
Alternatives and similar repositories for lens
Users that are interested in lens are comparing it to the libraries listed below
Sorting:
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆364Updated 12 years ago
- Hijack a Subaru's key fob and steal all the things☆374Updated 8 years ago
- Reticle is a C&C network for small devices that want to be friends.☆90Updated 11 years ago
- repository for keys and key accessories☆145Updated 10 years ago
- ☆75Updated 10 years ago
- A collection of tools for generating models of physical keys for 3D printing☆192Updated 7 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- An Open Source tool for RF reverse engineering.☆435Updated 6 years ago
- ☆167Updated 6 years ago
- SecKC Challenge☆111Updated 8 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Updated 8 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆611Updated 6 months ago
- OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy☆879Updated 5 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆843Updated 5 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆261Updated 8 years ago
- Example flowgraphs for osmo-fl2k☆536Updated 7 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated 2 months ago
- Snoopy: A distributed tracking and data interception framework☆609Updated 13 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Tool to read and write iclass cards without the master key☆108Updated 6 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- ☆484Updated 3 months ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,261Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Updated 9 years ago
- 3D reproduction of TSA Master keys☆71Updated 4 years ago
- software for the Girl Tech IM-Me☆158Updated 9 years ago