johnnyxmas / TSA-Travel-Sentry-master-keysLinks
3D reproduction of TSA Master keys
☆71Updated 4 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
Sorting:
- A tool for processing a lot of pcaps using tshark☆154Updated 2 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- Random Code, POC Scripts and other things (Your Mileage May Vary)☆90Updated 6 years ago
- ☆167Updated 6 years ago
- ☆208Updated 7 years ago
- for the louise☆245Updated 5 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆161Updated 4 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- DEF CON Hacker Tracker☆109Updated 3 years ago
- How to create stickers and files for creating stickers☆32Updated 2 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Web Sight Docker Deployment☆122Updated 8 years ago
- ☆233Updated 5 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆44Updated 7 years ago
- #CyberBarcode☆69Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆36Updated 6 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆224Updated 5 years ago
- How I hacked mine..☆21Updated 6 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆261Updated 3 weeks ago
- Prevent RubberDucky (or other keystroke injection) attacks☆528Updated last year
- Bypass captive portals by impersonating inactive users☆77Updated 10 years ago
- ☆75Updated 10 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆473Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Stargate☆95Updated 9 years ago