phooky / contact-tracing-ble
Quick implementation of the Apple/Google joint contact tracing beacon specification (now known as "Exposure Notification")
☆34Updated 4 years ago
Alternatives and similar repositories for contact-tracing-ble:
Users that are interested in contact-tracing-ble are comparing it to the libraries listed below
- Contact Tracing BLE sniffer PoC☆80Updated 3 years ago
- Raspberry-based E-Paper Smart Home Display Project☆19Updated this week
- Reverse engineering of the oBike protocol communication (BLE and HTTP)☆41Updated 5 years ago
- Utility to glitch and dump an AirTag☆161Updated 3 years ago
- SAO/Badge for Tor at Defcon 27☆21Updated 5 years ago
- A collaborative effort to liberate Sonos devices from their cloudy masters.☆59Updated 2 years ago
- Linger is a small, portable device that allows you to create and blend into a virtual crowd.☆102Updated 3 months ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- Source to www.draw.io☆99Updated 5 years ago
- Isomer base system - the decentralized application framework☆20Updated 3 years ago
- Parsing module for BtSnoop packet capture files and encapsulated Bluetooth packets☆33Updated 9 years ago
- ☆10Updated 9 years ago
- ISP for the ABOV MC81F4204☆14Updated 7 years ago
- AirTag instrumentation including AirTechno and firmware downgrades.☆161Updated 2 weeks ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Spying on Microcontrollers using Current Sensing and embedded TinyML models☆80Updated 3 years ago
- Unofficial firmware tools for my favorite sports camera(s).☆66Updated 9 years ago
- ☆38Updated 8 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆17Updated 5 years ago
- Chromium extension to inspect W3C Web Cryptography API calls and keys.☆14Updated 10 years ago
- Nmap for Bluetooth Low Energy☆181Updated 7 months ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Wi-Fi Geolocation Spoofing with ESP8266 / ESP32☆426Updated 9 months ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- ☆13Updated 7 years ago
- Desfire card library for Python☆18Updated 7 years ago
- An experimental file formats playground☆86Updated last year
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 3 years ago