oseiskar / corona-snifferLinks
Contact Tracing BLE sniffer PoC
☆81Updated 4 years ago
Alternatives and similar repositories for corona-sniffer
Users that are interested in corona-sniffer are comparing it to the libraries listed below
Sorting:
- CCC: Analyse des Staatstrojaners "FinSpy" für Android☆115Updated 5 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 3 years ago
- Reverse engineering of the oBike protocol communication (BLE and HTTP)☆41Updated 6 years ago
- Passive SDR analysis of goTenna packets with scapy☆37Updated 3 years ago
- ☆37Updated 8 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 3 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆48Updated 5 years ago
- Tools for the analysis of FinSpy/FinFisher components #spyware #trojan #govware☆96Updated 5 years ago
- Nmap for Bluetooth Low Energy☆199Updated last year
- Privacy Enhancements for Android☆14Updated 5 years ago
- ☆196Updated 4 years ago
- Packet-o-matic NG !☆65Updated 3 months ago
- HomePlugAV tools to test PLC (in)security☆49Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwares☆50Updated 6 years ago
- Modification to srsLTE to enable wireless emergency alerts (WEA) via SIB-12 CMAS messages. CMU 14-829 Mobile & IoT Security project.☆27Updated 5 years ago
- Mifare Classic Offline Cracker☆23Updated 5 years ago
- Check LTE Network Cipher Support -- over the air☆78Updated 2 years ago
- ☆195Updated 2 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 6 years ago
- ☆239Updated 8 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- RF430FRL152H examples for NFC Type V in Kicad and C.☆75Updated 5 years ago
- Brutally optimizing guess-and-determine attacks https://www.usenix.org/conference/woot18/presentation/verstegen☆41Updated 7 years ago
- ☆64Updated 2 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- A LoRaWAN Security Evaluation Framework☆41Updated last year
- SAO/Badge for Tor at Defcon 27☆21Updated 6 years ago
- Convert log messages by phones with XGold baseband processor back to GSM/UMTS radio messages☆160Updated 11 years ago