rani-i / Mi365LockerLinks
Xiaomi Mi365 Scooter locker
☆216Updated 6 years ago
Alternatives and similar repositories for Mi365Locker
Users that are interested in Mi365Locker are comparing it to the libraries listed below
Sorting:
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Updated 8 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆92Updated 9 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆474Updated 6 years ago
- BadUSB in Routers☆199Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆159Updated 8 years ago
- A basic Duckyscript to Arduino converter☆62Updated 6 years ago
- Krack POC☆125Updated 7 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Work in progress toolkit for KRACK attack.☆70Updated 6 years ago
- rolljam☆88Updated 9 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 7 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆282Updated 4 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Car Backdoor Maker☆220Updated 7 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆607Updated 4 years ago
- Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader☆101Updated 6 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Updated last year
- ☆124Updated 9 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆456Updated 7 years ago
- Remote video eavesdropping using a software-defined radio platform☆124Updated 8 years ago
- ☆84Updated 7 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆178Updated 9 years ago
- WiFi Enabled USB Rubber Ducky☆153Updated 9 years ago
- Plug-and-play bash script for sniffing 802.11 probes requests☆252Updated 7 years ago
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆337Updated 6 years ago
- ☆221Updated 5 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Updated 9 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆156Updated 7 years ago
- A Software Defined Radio Attack Tool☆547Updated last year