nislab / snout
An SDR-Based Network Observation Utility Toolkit.
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for snout
- Zigator: A security analysis tool for Zigbee and Thread networks☆29Updated last year
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆156Updated 6 years ago
- Some Scapy layers and tools to study LoRa PHY and LoRaWAN☆108Updated 2 weeks ago
- scapy-radio (from original Hg repo)☆84Updated last year
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆84Updated 10 years ago
- Client side tools to play the CTS contest☆44Updated 3 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated last year
- RFQuack: the versatile RF-analysis tool that quacks!☆90Updated 2 years ago
- Modification to srsLTE to enable wireless emergency alerts (WEA) via SIB-12 CMAS messages. CMU 14-829 Mobile & IoT Security project.☆25Updated 4 years ago
- The BUSSide Badge☆46Updated 2 years ago
- passive keyless entry exploit research☆27Updated 3 years ago
- A Basic BBI Tool - So Simple, But So Good!☆27Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆53Updated last year
- cheap and terrible voltage glitcher hardware/software☆39Updated 4 years ago
- Notes and resorce's for SDR/Wireless tech☆157Updated 10 months ago
- A tool that can read the commands off an NFC reader using an RTL-SDR☆33Updated 6 years ago
- GSExtract is a tool for converting imperfect satellite radio captures of internet traffic transmitted using Generic Stream Encapsulation …☆68Updated 3 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆55Updated 5 years ago
- This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or …☆172Updated last year
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆56Updated 2 years ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆17Updated 2 years ago
- ☆65Updated last month
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆22Updated last year
- GNURadio DECT Audio Decoder, Updated for US channels☆63Updated 5 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆90Updated 3 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆97Updated last year
- Research on the Gallagher / Cardax access control system☆63Updated 4 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆47Updated 3 years ago
- USBNinja Embedded Software Framework☆56Updated 5 years ago
- Multipurpose Breakout for the FT232H☆94Updated 9 months ago