offensive-security / rfid-em4x-harvester
EM4x RFID Harvester using a Robotics Connection reader
☆14Updated 12 years ago
Alternatives and similar repositories for rfid-em4x-harvester:
Users that are interested in rfid-em4x-harvester are comparing it to the libraries listed below
- Kali Linux u-boot images☆26Updated 5 years ago
- Various Wireless Driver patches☆32Updated 5 years ago
- gcc-arm-linux-gnueabihf-4.7/☆31Updated 5 years ago
- kali-sly-pi☆33Updated 5 years ago
- gcc-arm-eabi-linaro-4.6.2☆24Updated 5 years ago
- Kali Linux Windows App chroot builder script☆45Updated 5 years ago
- ☆36Updated 5 years ago
- Various Kali Scripts☆55Updated 8 years ago
- ☆46Updated 5 years ago
- Various Proxmark3 Mods☆56Updated 12 years ago
- ☆22Updated 5 years ago
- Kali Linux NetHunter utils package☆106Updated 5 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 5 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆28Updated 2 weeks ago
- GSM Sniffer☆34Updated 13 years ago
- ☆46Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Interface for the Shodan Computer Search Engine API☆24Updated 4 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆41Updated 14 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Hacking environment installation scripts for OS X☆25Updated 3 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- Reliable Teensy Penetration Testing Payload☆179Updated 12 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 8 years ago
- ☆15Updated 7 years ago
- BlackArch Linux Keyring☆21Updated 6 years ago
- cSploit traffic manipulator☆29Updated 7 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Updated 10 years ago
- ☆9Updated 8 years ago