rani-i / Mi365LockerLinks
Xiaomi Mi365 Scooter locker
☆214Updated 6 years ago
Alternatives and similar repositories for Mi365Locker
Users that are interested in Mi365Locker are comparing it to the libraries listed below
Sorting:
- An Android app that lets you use your access control card cloning devices in the field.☆462Updated 5 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆87Updated 9 years ago
- Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader☆101Updated 6 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆280Updated 3 years ago
- rolljam☆86Updated 8 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 8 years ago
- Mousejack for ATmega32u4☆217Updated 2 years ago
- BadUSB in Routers☆197Updated 2 years ago
- Live logger and GUI tool for the Chameleon Mini developed for Android OS in Java.☆96Updated 2 years ago
- Work in progress toolkit for KRACK attack.☆69Updated 6 years ago
- ☆367Updated last year
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- Krack POC☆125Updated 7 years ago
- The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.☆35Updated 9 months ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆602Updated 4 years ago
- ☆121Updated 8 years ago
- Automated DeAuth attack☆311Updated last year
- Plug-and-play bash script for sniffing 802.11 probes requests☆250Updated 6 years ago
- Mi365Locker - iOS Client build on Adafruit's Basic-Chat☆55Updated 6 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆258Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆254Updated 6 years ago
- ☆221Updated 5 years ago
- Terminal for working with Mifare Classic 1-4k Tags☆152Updated last year
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆337Updated 5 years ago
- A Software Defined Radio Attack Tool☆540Updated 6 months ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆450Updated 7 years ago