ervanalb / lensLinks
Tap live cabling for inspection and injection
☆515Updated 6 years ago
Alternatives and similar repositories for lens
Users that are interested in lens are comparing it to the libraries listed below
Sorting:
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆363Updated 12 years ago
- Hijack a Subaru's key fob and steal all the things☆369Updated 7 years ago
- ☆75Updated 10 years ago
- repository for keys and key accessories☆145Updated 10 years ago
- An Open Source tool for RF reverse engineering.☆433Updated 5 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆604Updated last month
- Reticle is a C&C network for small devices that want to be friends.☆90Updated 11 years ago
- SecKC Challenge☆111Updated 7 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆498Updated 8 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆440Updated 8 years ago
- Example flowgraphs for osmo-fl2k☆531Updated 7 years ago
- Nyancat in the MBR☆122Updated 12 years ago
- Tire Pressure Monitoring System decoding tools.☆363Updated 4 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,255Updated 8 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 3 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆836Updated 4 years ago
- OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy☆870Updated 4 years ago
- A software to create 3D models for key blanks, bumpkeys and regular keys☆118Updated 8 months ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆361Updated 10 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆914Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 10 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆264Updated 8 years ago
- Subaru StarLink persistent root code execution.☆575Updated 4 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Updated 6 years ago
- An entropy generator using SDR peripherals, including rtl-sdr and BladeRF☆360Updated 4 years ago
- Database of private SSL/SSH keys for embedded devices☆266Updated last year
- #CyberBarcode☆67Updated last year