rani-i / Mi365LockerLinks
Xiaomi Mi365 Scooter locker
☆215Updated 6 years ago
Alternatives and similar repositories for Mi365Locker
Users that are interested in Mi365Locker are comparing it to the libraries listed below
Sorting:
- Wireless mouse/keyboard attack with replay/transmit poc☆89Updated 9 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆280Updated 4 years ago
- Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader☆101Updated 6 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆465Updated 6 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 8 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆604Updated 4 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆154Updated 8 years ago
- rolljam☆86Updated 9 years ago
- BadUSB in Routers☆198Updated 2 years ago
- Automated DeAuth attack☆312Updated last year
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- Remote video eavesdropping using a software-defined radio platform☆122Updated 7 years ago
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆336Updated 5 years ago
- Krack POC☆125Updated 7 years ago
- Toolkit for Playing with Wi-Fi Probe Requests☆268Updated 2 weeks ago
- Jam and replay attack on vehicle keyless entry systems.☆377Updated 6 years ago
- Perform advanced MiTM attacks on websites with ease 💉☆678Updated last year
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆36Updated 11 months ago
- ☆122Updated 8 years ago
- Mousejack for ATmega32u4☆225Updated 2 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆450Updated 7 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 9 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆176Updated 8 years ago
- ☆222Updated 5 years ago
- Work in progress toolkit for KRACK attack.☆69Updated 6 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago