h4ck3rb0x / DEFCON31Links
☆28Updated 2 years ago
Alternatives and similar repositories for DEFCON31
Users that are interested in DEFCON31 are comparing it to the libraries listed below
Sorting:
- An Open-Source Door Simulator for RFID/PACS Training☆129Updated 8 months ago
- OSDP attack tool (and the Elvish word for friend)☆100Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 9 months ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated last week
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆19Updated 8 months ago
- Evil Crow Cable Pro device☆116Updated 3 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆50Updated 11 months ago
- ☆20Updated 2 years ago
- ☆145Updated 11 months ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆18Updated 2 years ago
- This will be a wiki when it grows up, if it grows up☆93Updated last year
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Collection of FCC IDs for car keyfobs☆49Updated 4 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 7 months ago
- Design files for physical radio cases, etc☆60Updated 11 months ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆143Updated 3 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆41Updated 6 months ago
- DEFCON 31 slide deck and video link☆64Updated 2 months ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
- ☆28Updated last year
- DEFCON 32 Badge Game☆59Updated 11 months ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆25Updated 7 months ago
- Bluetooth Security Assessment Methodology☆132Updated last year
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Updated 2 years ago
- ☆20Updated last year
- Neuviks Terraform Red Team Workshop☆13Updated 7 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆22Updated last month
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago