mossmann / stealthlock
stuff from my ToorCon 2015 talk
☆15Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for stealthlock
- ☆10Updated 7 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆27Updated 8 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- ☆15Updated 8 years ago
- A Facedancer21 expansion board for the BeagleBone.☆22Updated 10 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- ☆13Updated 7 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- ☆15Updated 6 years ago
- ☆12Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- An upconverter from 0-6GHz to 740THz☆25Updated 6 years ago
- ☆20Updated 8 years ago
- Software defined radio transmitter for EAchine E012 mini quadcopter☆14Updated 7 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Updated last year
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Python-Based Tool for finding intermittent radio waveforms within IQ files☆19Updated 5 years ago
- ZigBee hacking tools and scripts☆12Updated 6 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆20Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago