Wiegotcha: Long Range RFID Thief
☆236Oct 25, 2021Updated 4 years ago
Alternatives and similar repositories for Wiegotcha
Users that are interested in Wiegotcha are comparing it to the libraries listed below
Sorting:
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Jun 26, 2018Updated 7 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆484Jul 27, 2019Updated 6 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- This is pulled from http://www.openpcd.org/Talk:HID_iClass_demystified☆21Dec 17, 2012Updated 13 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆37Feb 14, 2017Updated 9 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Dec 18, 2017Updated 8 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆264Mar 15, 2017Updated 8 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- RFIDler - Software defined RFID (LF) Reader/Writer/Emulator☆481Sep 22, 2024Updated last year
- A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into…☆559Jan 4, 2023Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- ☆27Oct 30, 2020Updated 5 years ago
- JackIt - Exploit Code for Mousejack☆889Oct 1, 2020Updated 5 years ago
- [Deprecated] Iceman Fork, the most totally wicked fork around if you are into proxmark3☆475Jun 12, 2020Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- Python - Human Interface Device Android Attack Framework☆48Apr 30, 2017Updated 8 years ago
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- Magspoof R3 - Wireless magnetic stripe emulator☆69Oct 25, 2018Updated 7 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆63Sep 25, 2016Updated 9 years ago
- Pypykatz server☆123Mar 15, 2019Updated 6 years ago
- Library and applications for interfacing with eidc32 and intelli-m☆13Oct 18, 2021Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Chameleon Mini revE rebooted - Iceman Fork, the ChameleonMini is a versatile contactless smartcard emulator (NFC/RFID)☆414Jan 10, 2024Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- rfcat port for the 900MHz Explorer board☆27Dec 19, 2016Updated 9 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- EM4100 RFID Cloner Kit☆62May 7, 2023Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆957Nov 18, 2020Updated 5 years ago
- Password spraying using AWS Lambda for IP rotation☆656Feb 14, 2023Updated 3 years ago
- ☆106Feb 2, 2016Updated 10 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆869Aug 4, 2017Updated 8 years ago