nonamecoder / DC30-CHV-PresentationLinks
DEFCON 30 Car Hacking Village Presentation
☆11Updated 2 years ago
Alternatives and similar repositories for DC30-CHV-Presentation
Users that are interested in DC30-CHV-Presentation are comparing it to the libraries listed below
Sorting:
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆15Updated 4 years ago
- GNU radio files used for recording and transmitting key fob signals☆13Updated 4 years ago
- The required tools and materials to perform Samy Kamkar's RollJam attack☆15Updated 4 years ago
- Port of Samy Kamkar's OpenSesame to Si4010☆24Updated 5 years ago
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆19Updated 9 years ago
- Bypassing Rolling Code Systems☆42Updated 5 years ago
- A tool for performing relay attacks on RFID/NFC systems (ISO 14443-4A)☆20Updated 2 years ago
- Some power wifi/dev stuff for Flipper Zero by B4☆10Updated 2 years ago
- Yardstick One Scripts for your RF Adventures☆16Updated 3 weeks ago
- ☆21Updated 2 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- ☆23Updated 4 years ago
- A compilation repository of all my findings regarding intercepting, decoding, and decrypting GSM data using a HackRF.☆23Updated 9 years ago
- USBNinja Professional. Upgraded from USBNinja.☆44Updated 2 years ago
- ☆14Updated 6 years ago
- A MagSpoof build using STM32☆13Updated 4 years ago
- Timejam for Rolljam with Hackrf Portapack☆35Updated 4 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 5 months ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆27Updated 6 months ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Updated 4 years ago
- Proof of Concept for CVE-2023-22906☆7Updated last year
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated last week
- A Software Defined Radio Attack Tool☆11Updated 7 years ago
- A vehicle network analysis and attack tool.☆17Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated 4 months ago
- Receive/Transmit/Save Evil Crow RF log files 📡☆14Updated last year
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Updated 2 years ago
- Awesome BLE Hack repository☆12Updated 6 years ago