offensive-security / rfid-em4x-harvester
EM4x RFID Harvester using a Robotics Connection reader
☆14Updated 12 years ago
Alternatives and similar repositories for rfid-em4x-harvester:
Users that are interested in rfid-em4x-harvester are comparing it to the libraries listed below
- Various Wireless Driver patches☆32Updated 5 years ago
- Kali Linux u-boot images☆26Updated 5 years ago
- kali-sly-pi☆33Updated 5 years ago
- gcc-arm-linux-gnueabihf-4.7/☆31Updated 5 years ago
- Kali Linux Windows App chroot builder script☆45Updated 5 years ago
- Various Kali Scripts☆55Updated 8 years ago
- gcc-arm-eabi-linaro-4.6.2☆24Updated 5 years ago
- ☆36Updated 5 years ago
- ☆22Updated 5 years ago
- Various Proxmark3 Mods☆55Updated 12 years ago
- ☆46Updated 5 years ago
- Kali Linux NetHunter utils package☆105Updated 5 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 5 years ago
- ☆46Updated 8 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 9 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last month
- GSM Sniffer☆34Updated 13 years ago
- Interface for the Shodan Computer Search Engine API☆23Updated 4 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- ParrotSec rootfs arm (armhf at the moment) builder.☆17Updated 7 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Documentation featuring how to revoke API keys of different websites☆48Updated 8 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- This is a collection of scripts to add to kali linux☆19Updated 7 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- NAT Pinning exploit tool for penetration testers.☆33Updated 11 years ago
- cSploit traffic manipulator☆29Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆22Updated 7 years ago