lixmk / WiegotchaLinks
Wiegotcha: Long Range RFID Thief
☆237Updated 4 years ago
Alternatives and similar repositories for Wiegotcha
Users that are interested in Wiegotcha are comparing it to the libraries listed below
Sorting:
- A Bluetooth Low Energy device for interfacing with Wiegand☆264Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Mousejack for ATmega32u4☆233Updated 2 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Updated 7 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆468Updated 6 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆499Updated 8 years ago
- ☆167Updated 6 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- ☆83Updated 7 years ago
- Tool to read and write iclass cards without the master key☆107Updated 6 years ago
- HID attack payload generator for Arduinos☆164Updated last year
- Helper scripts for RfCat devices☆211Updated 8 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆62Updated 9 years ago
- Duct Tape Command and Control!☆96Updated 3 months ago
- Mobile UI for kismet☆183Updated last year
- ☆235Updated last year
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆106Updated 9 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Malicious USB☆174Updated 2 years ago
- rolljam☆87Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- ☆75Updated 10 years ago
- A ZigBee hacking toolkit by Bishop Fox☆288Updated 4 years ago
- ☆208Updated 7 years ago
- Reliable Teensy Penetration Testing Payload☆181Updated 13 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆69Updated 7 years ago
- A tool for processing a lot of pcaps using tshark☆153Updated 2 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆72Updated 8 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago