☆76Aug 7, 2015Updated 10 years ago
Alternatives and similar repositories for Access-Control-Attack-Tool
Users that are interested in Access-Control-Attack-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools to pull data from HID iClass readers☆18Nov 9, 2012Updated 13 years ago
- Converts KISMET/AirCrack NetXML Wireless logs to a CSV format.☆15Jan 1, 2015Updated 11 years ago
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- This is pulled from http://www.openpcd.org/Talk:HID_iClass_demystified☆21Dec 17, 2012Updated 13 years ago
- Proxmark 3☆15Jul 11, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆167Feb 22, 2019Updated 7 years ago
- Mitigates CVE-2016-5195 aka DirtyCOW☆10Oct 23, 2016Updated 9 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆63Sep 25, 2016Updated 9 years ago
- Convert .netxml file into CSV file☆15Aug 23, 2021Updated 4 years ago
- A tool allows you use your phone emulating NFC cards☆24Mar 23, 2017Updated 9 years ago
- uhf-rfid reader based on two TI1101 modules and an Arduino Due☆21Oct 17, 2022Updated 3 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- RetDec Offline Decompiler☆46Feb 11, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Global key for HID iCLASS☆41Nov 28, 2016Updated 9 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Z-Wave Packet Interception and Injection Tool☆37Nov 4, 2015Updated 10 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- Anonymously check if an email sender has ever been compromised in a security breach. Service provided by https://hacked-emails.com/☆14Apr 13, 2018Updated 8 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- allows for magnetic card swipe data input using the square card reader plugged into the headphone port of your laptop or tablet☆17Jun 21, 2014Updated 11 years ago
- Run Responder locally on a Raspberry Pi Zero.☆32May 8, 2023Updated 2 years ago
- Converts and analyzes flight paths for possible surveillance activity - prototype☆24Oct 2, 2017Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Dec 18, 2017Updated 8 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆264Mar 15, 2017Updated 9 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- XBMC Video Addons☆19Dec 19, 2015Updated 10 years ago
- ☆14Dec 13, 2022Updated 3 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Basic demo for Hidden Treasure talk.☆49Nov 4, 2017Updated 8 years ago
- x86 Instruction Set Reference☆12Sep 30, 2019Updated 6 years ago
- Retro motherboard BIOS modifications released on TheRetroWeb☆18Nov 8, 2025Updated 5 months ago
- A one to one address mapping program for tranlation from IPv4 packets to IPv6 packets and vice versa.☆17Oct 7, 2020Updated 5 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago