jspark311 / BuriedUnderTheNoiseFloorView external linksLinks
A PHP program to compress, encrypt, and hide messages inside of PNG files.
☆94Oct 18, 2021Updated 4 years ago
Alternatives and similar repositories for BuriedUnderTheNoiseFloor
Users that are interested in BuriedUnderTheNoiseFloor are comparing it to the libraries listed below
Sorting:
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆14Oct 25, 2017Updated 8 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 2 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- instructions on the CubeFactory 2☆11Oct 7, 2019Updated 6 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- Multi Platform CSV Log Analyzer Tested on Win/Linux/Android☆12Apr 12, 2020Updated 5 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Circular span☆12May 24, 2024Updated last year
- Using LLVM Clang on Windows with CMake☆10Dec 4, 2021Updated 4 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- ☆12Aug 5, 2025Updated 6 months ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Mobile NMR Relaxometry Platform☆10May 4, 2023Updated 2 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- hexdumpmem is hexdump-like tool to dump memory and write memory. When developing a system on a SoC, I usually need to dump or write memor…☆11Jun 28, 2022Updated 3 years ago
- Карманный тестер фискального накопителя (flipper zero)☆13Apr 14, 2025Updated 10 months ago
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆14Sep 16, 2020Updated 5 years ago
- Using Xaml in the Win32 app model using DesktopWindowXamlSource☆16Jul 19, 2024Updated last year
- IR Remote Control to USB HID Converter☆18Sep 15, 2024Updated last year
- Instructions for hacking and cloning RFID cards☆18Nov 28, 2023Updated 2 years ago
- SATA sniffing☆15Jul 28, 2022Updated 3 years ago
- ☆13Sep 24, 2023Updated 2 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆18Nov 5, 2021Updated 4 years ago