johnnyxmas / TSA-Travel-Sentry-master-keys
3D reproduction of TSA Master keys
☆70Updated 3 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
Sorting:
- Duct Tape Command and Control!☆94Updated 6 years ago
- ☆166Updated 6 years ago
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- ☆143Updated 8 years ago
- ☆247Updated 8 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆71Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Web Sight Docker Deployment☆123Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Global key for HID iCLASS☆42Updated 8 years ago
- Bypass captive portals by impersonating inactive users☆78Updated 10 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Stargate☆94Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆87Updated 7 years ago
- TouchTunes Wireless Remote Sniffer/Transmitter for the Yard Stick One☆174Updated 3 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- ☆230Updated 5 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- ☆369Updated last year
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 8 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- Malicious USB☆171Updated last year
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆62Updated 6 years ago