Malduino Elite firmware
☆46May 31, 2017Updated 8 years ago
Alternatives and similar repositories for malduino-elite
Users that are interested in malduino-elite are comparing it to the libraries listed below
Sorting:
- Magnetic stripe spoofer implementing audio waves.☆40Jan 7, 2017Updated 9 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- ☆10Jul 28, 2017Updated 8 years ago
- Man-in-the-middle device for attacking RFID access control systems☆16Feb 7, 2023Updated 3 years ago
- Boscloner - All in One RFID Cloning Toolkit☆16Apr 14, 2017Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated last year
- Magnetic Pentesting tool for Raspberry Pi☆65Jul 6, 2020Updated 5 years ago
- A library for reading, writing and analysis of magnetic stripe information.☆15Apr 12, 2020Updated 5 years ago
- Random collection of breakout boards☆14Oct 26, 2025Updated 4 months ago
- ☆14Sep 12, 2020Updated 5 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆13Dec 10, 2015Updated 10 years ago
- edge --> powerpoint --> remote-file --> shell☆11May 17, 2019Updated 6 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆16Jul 12, 2021Updated 4 years ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆15Sep 9, 2023Updated 2 years ago
- ESP8266 Pen-testing Deauther made into a sonic screwdriver controller.☆16Dec 4, 2021Updated 4 years ago
- A tool to run Duckyscript without using a USB rubberducky☆23Sep 2, 2022Updated 3 years ago
- app with bus-pirate like functionality for the Flipper Zero☆21Oct 23, 2023Updated 2 years ago
- This is a fast script to deauth all, a network or target with a built in oui lookup tool.☆19Jul 8, 2018Updated 7 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- Emulate RFID using an Arduino☆22Aug 3, 2010Updated 15 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- A project on the security in rolling code remote keyless entry systems, primarily used in vehicles. The project uses a laptop with a SDR …☆29May 23, 2022Updated 3 years ago
- Magspoof implementation via ESP8266 (ledunia)☆21Jul 27, 2018Updated 7 years ago
- Implementation of SlowLoris DOS tool using mutliple TOR Proxies☆18Jul 28, 2014Updated 11 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆23Mar 26, 2017Updated 8 years ago
- A tool allows you use your phone emulating NFC cards☆24Mar 23, 2017Updated 8 years ago
- Hardware designs for CC11xx☆101Oct 28, 2021Updated 4 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Dec 18, 2017Updated 8 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Aug 15, 2016Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- WiFi Enabled USB Rubber Ducky☆152Dec 17, 2016Updated 9 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Proxmark3 client for Android☆26Jul 2, 2017Updated 8 years ago
- Determines physical location of station judging from 802.11 beacons' BSSID/Signal/Noise/Quality information.☆38Dec 9, 2010Updated 15 years ago