☆76Aug 7, 2015Updated 10 years ago
Alternatives and similar repositories for Access-Control-Attack-Tool
Users that are interested in Access-Control-Attack-Tool are comparing it to the libraries listed below
Sorting:
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- This is pulled from http://www.openpcd.org/Talk:HID_iClass_demystified☆21Dec 17, 2012Updated 13 years ago
- ☆167Feb 22, 2019Updated 7 years ago
- Mitigates CVE-2016-5195 aka DirtyCOW☆10Oct 23, 2016Updated 9 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆63Sep 25, 2016Updated 9 years ago
- A tool allows you use your phone emulating NFC cards☆24Mar 23, 2017Updated 8 years ago
- uhf-rfid reader based on two TI1101 modules and an Arduino Due☆21Oct 17, 2022Updated 3 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Global key for HID iCLASS☆41Nov 28, 2016Updated 9 years ago
- Z-Wave Packet Interception and Injection Tool☆37Nov 4, 2015Updated 10 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- Converts and analyzes flight paths for possible surveillance activity - prototype☆24Oct 2, 2017Updated 8 years ago
- Run Responder locally on a Raspberry Pi Zero.☆32May 8, 2023Updated 2 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Dec 18, 2017Updated 8 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆264Mar 15, 2017Updated 9 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- ☆13Dec 13, 2022Updated 3 years ago
- Toy genetic algorithm with GUI☆11Jun 13, 2015Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- IMF4-Binary☆12Oct 19, 2018Updated 7 years ago
- ☆14Jul 17, 2018Updated 7 years ago
- A one to one address mapping program for tranlation from IPv4 packets to IPv6 packets and vice versa.☆17Oct 7, 2020Updated 5 years ago
- Hijack a Subaru's key fob and steal all the things☆375Oct 30, 2017Updated 8 years ago
- ☆11Jan 7, 2018Updated 8 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- A WebSocket server to publish messages when someone pushed a hardware game show buzzer 🚀☆10Aug 19, 2024Updated last year
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Proxy for viewing crime data from crimemapping.com based on latitude and longitude coordinates☆13Jun 5, 2019Updated 6 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago