h4ck3rb0x / DEFCON31Links
☆28Updated 2 years ago
Alternatives and similar repositories for DEFCON31
Users that are interested in DEFCON31 are comparing it to the libraries listed below
Sorting:
- An Open-Source Door Simulator for RFID/PACS Training☆136Updated last year
- OSDP attack tool (and the Elvish word for friend)☆107Updated 2 years ago
- ☆19Updated 2 years ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆61Updated 4 months ago
- ☆149Updated last year
- Evil Crow Cable Pro device☆128Updated last month
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
- ☆28Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆25Updated 2 months ago
- A respository of information and links to promote support and continued development of the DEFCON 32 badge. This repository is not associ…☆26Updated last year
- DEFCON 32 Badge Game☆61Updated last year
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 4 months ago
- This will be a wiki when it grows up, if it grows up☆95Updated 3 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆58Updated 7 months ago
- Collection of FCC IDs for car keyfobs☆55Updated 8 months ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆18Updated 2 years ago
- Signal Tracking & Detection☆18Updated 2 weeks ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 10 months ago
- Bluetooth Security Assessment Methodology☆139Updated last year
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆165Updated 3 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆107Updated 2 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Updated last year
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆37Updated 3 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 2 months ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 3 years ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆27Updated 11 months ago
- Design files for physical radio cases, etc☆67Updated last year
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 3 years ago
- Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and edu…☆238Updated last month