nonamecoder / DC30-CHV-Presentation
DEFCON 30 Car Hacking Village Presentation
☆10Updated 2 years ago
Alternatives and similar repositories for DC30-CHV-Presentation:
Users that are interested in DC30-CHV-Presentation are comparing it to the libraries listed below
- A tool for performing relay attacks on RFID/NFC systems (ISO 14443-4A)☆12Updated 2 years ago
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆15Updated 4 years ago
- ☆11Updated 4 years ago
- GNU radio files used for recording and transmitting key fob signals☆13Updated 3 years ago
- Proof of Concept for CVE-2023-22906☆7Updated last year
- ☆21Updated 2 years ago
- Yardstick One Scripts for your RF Adventures☆16Updated last year
- Starter Kit: Hardware Hacking☆13Updated 4 years ago
- The required tools and materials to perform Samy Kamkar's RollJam attack☆15Updated 4 years ago
- Bypassing Rolling Code Systems☆41Updated 5 years ago
- Receive/Transmit/Save Evil Crow RF log files 📡☆14Updated last year
- ☆22Updated 4 years ago
- ☆16Updated 5 years ago
- A Software Defined Radio Attack Tool☆11Updated 7 years ago
- Repo of Ducky scripts I have created for the O.MG Cable and FlipperZero☆18Updated 2 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 3 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆12Updated 2 years ago
- ☆14Updated 6 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- Digispark 6-Digit PIN Brute Force attack for USB-OTG Android devices☆14Updated 4 months ago
- ☆13Updated last year
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆25Updated 3 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆26Updated 4 months ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Updated 4 years ago
- Collection of scripts and how-to for hacking embedded devices☆22Updated last month
- A MagSpoof build using STM32☆13Updated 4 years ago
- Module PMKIDAttack for WiFi Pineapple☆11Updated 2 years ago
- Modified version of Duckuino to convert Ducky Script for use with Devices running ESPloit(Cactus WHID)☆12Updated 7 years ago