inguardians / VaporTrailLinks
Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from an out-of-the-box Raspberry Pi, and an RTL-SDR to receive. Twitter handles: @unknownloner, @haxorthematrix, @inguardians
☆51Updated 7 years ago
Alternatives and similar repositories for VaporTrail
Users that are interested in VaporTrail are comparing it to the libraries listed below
Sorting:
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆87Updated 7 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆78Updated 7 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- ☆57Updated 4 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆90Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- OCL Hashcat username to decrypted password recombiner☆15Updated 10 years ago
- ☆46Updated 5 years ago
- Reconnaissance scripts for penetration testing☆58Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- Slides and code from "So You Want to Hack Radios", as presented by @marcnewlin and @matt-knight at ShmooCon 2017.☆74Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- One-off scripts☆51Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 11 months ago
- ☆28Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago