gcelosia / jokerLinks
A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary protocols.
☆17Updated 5 years ago
Alternatives and similar repositories for joker
Users that are interested in joker are comparing it to the libraries listed below
Sorting:
- A LoRaWAN Security Evaluation Framework☆42Updated last year
- Content related to hardware hacking☆54Updated 6 years ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆54Updated 5 years ago
- Conferences, tools, papers, etc.☆46Updated last month
- ☆34Updated 6 years ago
- Network Traffic Fuzzer☆17Updated last year
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Blind Reverse Engineering a Wireless Protocol - or - Amateur Signals Intelligence☆22Updated 11 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆135Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- ☆21Updated 4 years ago
- A framework for parsing binary data.☆18Updated 3 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆48Updated 5 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Updated 2 years ago
- Toolkit developed to reverse engineer Google's Nearby Connections API☆23Updated 7 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 2 months ago
- ☆52Updated 3 weeks ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆46Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 7 months ago
- Intro to Assembly Optimization stream repo☆28Updated 4 years ago
- a hassle-free way to build srsLTE and srsUE☆19Updated 8 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago