lixmk / WiegotchaLinks
Wiegotcha: Long Range RFID Thief
☆233Updated 3 years ago
Alternatives and similar repositories for Wiegotcha
Users that are interested in Wiegotcha are comparing it to the libraries listed below
Sorting:
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- Mousejack for ATmega32u4☆217Updated 2 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆462Updated 5 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆261Updated 8 years ago
- HID attack payload generator for Arduinos☆165Updated last year
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- ☆166Updated 6 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆497Updated 7 years ago
- Mobile UI for kismet☆180Updated 9 months ago
- ☆249Updated 8 years ago
- Run Hak5 Bash Bunny scripts on a raspbery pi☆238Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆88Updated 7 years ago
- ☆83Updated 7 years ago
- ☆75Updated 9 years ago
- ☆224Updated last year
- ☆12Updated 8 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆62Updated 8 years ago
- Helper scripts for RfCat devices☆211Updated 8 years ago
- rolljam☆86Updated 8 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 8 years ago
- A Software Defined Radio Attack Tool☆540Updated 6 months ago
- How to create stickers and files for creating stickers☆32Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Stargate☆95Updated 8 years ago
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆106Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 8 months ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- ☆368Updated last year
- Web Sight Docker Deployment☆123Updated 7 years ago