kristinpaget / GuardBunny
Files for GuardBunny, an RFID shield presented at Shmoocon 2016
☆56Updated 6 years ago
Alternatives and similar repositories for GuardBunny:
Users that are interested in GuardBunny are comparing it to the libraries listed below
- EM4100 RFID Cloner Kit☆63Updated last year
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆35Updated 10 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 4 years ago
- AND!XOR DEFCON 24 Badge HW and SW☆44Updated 4 years ago
- RF retroreflectors☆100Updated 8 years ago
- A wearable Sub-GHz RF hacking tool☆120Updated 5 years ago
- This repository is deprecated. Go to:☆118Updated 5 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Hardware designs for CC11xx☆97Updated 3 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆85Updated 7 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- ☆27Updated 7 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- A sensitive IR detector for capturing and digitizing weak infrared signals☆71Updated 8 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆71Updated 8 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 6 years ago
- Code used in the Great Drone Duel of 2016☆23Updated 8 years ago
- Umbrella project for various ESP8266 programs☆15Updated 6 years ago
- DefCon Hardware Hacking Village Learn To Solder Kit☆39Updated 9 years ago
- ☆49Updated 8 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 2 years ago
- Utilities to help with reverse engineering RF protocols.☆91Updated 4 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- ☆18Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆22Updated 7 years ago