nonamecoder / DC30-CHV-PresentationLinks
DEFCON 30 Car Hacking Village Presentation
☆11Updated 3 years ago
Alternatives and similar repositories for DC30-CHV-Presentation
Users that are interested in DC30-CHV-Presentation are comparing it to the libraries listed below
Sorting:
- GNU radio files used for recording and transmitting key fob signals☆14Updated 4 years ago
- ☆17Updated 7 years ago
- Receive/Transmit/Save Evil Crow RF log files 📡☆15Updated 2 years ago
- ☆13Updated 2 years ago
- ESP8266 ROM Bootloader utility☆12Updated 5 years ago
- Btlejack Firmware for nRF52-based devices (Micro:Bit v2, etc.)☆20Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Updated 4 months ago
- self contained mfkey tool for all 3 mfkeys☆16Updated last year
- this android application detects the fake towers(base stations)☆10Updated 8 years ago
- A tool for performing relay attacks on RFID/NFC systems (ISO 14443-4A)☆28Updated 3 years ago
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆17Updated 4 years ago
- Man-in-the-middle device for attacking RFID access control systems☆16Updated 2 years ago
- ☆27Updated 5 years ago
- ☆23Updated 3 years ago
- A compilation repository of all my findings regarding intercepting, decoding, and decrypting GSM data using a HackRF.☆27Updated 9 years ago
- ESP8266 ROM Bootloader utility☆11Updated 8 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12Updated 6 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Updated 4 years ago
- Modified version of Duckuino to convert Ducky Script for use with Devices running ESPloit(Cactus WHID)☆13Updated 8 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 3 years ago
- A jamming-and-replay attack using SDR☆18Updated 6 years ago
- Yardstick One Scripts for your RF Adventures☆17Updated 8 months ago
- ☆11Updated 11 years ago
- Bypassing Rolling Code Systems☆45Updated 6 years ago
- Timejam for Rolljam with Hackrf Portapack☆39Updated 5 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Updated 5 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆33Updated 2 weeks ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).