joswr1ght / mfsmarthack
Tools for attacking various MIFARE RFID cards
☆15Updated 5 years ago
Alternatives and similar repositories for mfsmarthack:
Users that are interested in mfsmarthack are comparing it to the libraries listed below
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- ☆12Updated 4 years ago
- Converts Half-WPA handshake to hashcat☆18Updated 6 years ago
- ☆22Updated 4 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆25Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- privilege escalation in OSX through systemwide root for all PID on sudo☆8Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Free Email Providers☆10Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago