ieee8023 / blucat
Blucat (netcat for Bluetooth)
☆72Updated 5 years ago
Alternatives and similar repositories for blucat:
Users that are interested in blucat are comparing it to the libraries listed below
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆121Updated 5 years ago
- SilverEdge Inc. SilverPush Demo Apps (unmasked)☆83Updated 9 years ago
- Python API for Adafruit's Bluefruit LE Sniffer☆101Updated 6 months ago
- SSID Probe Request Collection Workshop☆141Updated 4 years ago
- DF and other tools to explore a 2.4GHz environment.☆71Updated 5 years ago
- A collection of Teensy 2.0 (C) and PC (C#) files allowing on-the-fly simulation of USB peripherals from a PC.☆48Updated 12 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- A pam module to send warnings when certain 'fake' passwords are used to login☆14Updated 5 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 8 years ago
- A Python client for the Kismet server protocol☆57Updated 8 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- Demodulate on/off keying☆26Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆59Updated 6 years ago
- A tool (and library) for TACKs☆25Updated 7 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago
- [Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.☆30Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Android device ecryption password manager and failed unlock attempts monitor☆49Updated 6 years ago
- ☆50Updated 10 years ago
- ☆35Updated 6 years ago
- ☆30Updated 9 years ago
- WPA2 passphrase recovery tool for UPC%07d devices☆58Updated 9 years ago
- ☆54Updated 11 years ago
- Python simulation of "rolljam" attacks☆17Updated 2 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Updated 7 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- NFC☆26Updated last year