ervanalb / lens
Tap live cabling for inspection and injection
☆514Updated 6 years ago
Alternatives and similar repositories for lens:
Users that are interested in lens are comparing it to the libraries listed below
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆360Updated 11 years ago
- ☆76Updated 9 years ago
- Nyancat in the MBR☆117Updated 12 years ago
- repository for keys and key accessories☆143Updated 9 years ago
- Hijack a Subaru's key fob and steal all the things☆364Updated 7 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆856Updated 7 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆274Updated 9 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆355Updated 9 years ago
- ☆166Updated 6 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 9 years ago
- Reticle is a C&C network for small devices that want to be friends.☆89Updated 11 years ago
- Key and Lock Decoding Tools☆1,133Updated 4 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 8 years ago
- #CyberBarcode☆65Updated last year
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆593Updated last week
- Stargate☆94Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- A proxy for USB devices, libUSB and gadgetFS - this project is unmaintained, try here: https://github.com/usb-tools/Facedancer☆448Updated 3 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆436Updated 8 years ago
- scripts and examples for using JTAG debug tools to gain root access☆176Updated 9 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆258Updated 8 years ago
- Various PoCs☆491Updated 5 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆674Updated 2 years ago
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆231Updated 9 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆582Updated 3 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆103Updated 8 years ago
- Tool to read and write iclass cards without the master key☆105Updated 5 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆542Updated 9 years ago