johnnyxmas / TSA-Travel-Sentry-master-keys
3D reproduction of TSA Master keys
☆70Updated 3 years ago
Alternatives and similar repositories for TSA-Travel-Sentry-master-keys:
Users that are interested in TSA-Travel-Sentry-master-keys are comparing it to the libraries listed below
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- Random Code, POC Scripts and other things (Your Mileage May Vary)☆89Updated 6 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- ☆76Updated 9 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- SecKC Challenge☆110Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- #CyberBarcode☆65Updated last year
- ☆142Updated 8 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- DEF CON Hacker Tracker☆107Updated 2 years ago
- Stargate☆94Updated 8 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆71Updated 8 years ago
- ☆206Updated 7 years ago
- internet monitoring osint telegram bot for windows☆153Updated 2 years ago
- RF retroreflectors☆100Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- Bypass captive portals by impersonating inactive users☆77Updated 10 years ago
- ☆166Updated 6 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆11Updated 5 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago