rfhs / rfhs-wiki
This will be a wiki when it grows up, if it grows up
☆91Updated 10 months ago
Alternatives and similar repositories for rfhs-wiki
Users that are interested in rfhs-wiki are comparing it to the libraries listed below
Sorting:
- Random files such as wordlists which maybe be useful for playing our game☆22Updated 9 months ago
- An Open-Source Door Simulator for RFID/PACS Training☆123Updated 6 months ago
- scripts that go in the rfctf container☆19Updated 3 weeks ago
- Blue Hydra☆72Updated 5 months ago
- Notes and resorce's for SDR/Wireless tech☆175Updated last month
- ☆39Updated 3 years ago
- ☆20Updated 9 months ago
- Collection of FCC IDs for car keyfobs☆47Updated last month
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆49Updated 4 years ago
- Client side tools to play the CTS contest☆46Updated 3 years ago
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆58Updated 2 years ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆184Updated this week
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆160Updated last year
- ☆20Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆94Updated 4 months ago
- OSDP attack tool (and the Elvish word for friend)☆99Updated last year
- Advanced: Bluetooth low energy capture the flag☆57Updated last year
- .sub files for the LED bracelets distributed at DEFCON☆16Updated 8 months ago
- ☆27Updated last year
- passive keyless entry exploit research☆29Updated 3 years ago
- Design files for physical radio cases, etc☆59Updated 8 months ago
- Hak5 WiFi Coconut Userspace☆127Updated last year
- Bluetooth Security Assessment Methodology☆126Updated 11 months ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆76Updated 6 months ago
- ☆20Updated 6 months ago
- uses the atom gps kit to wardrive and give status via the leds☆26Updated last year
- ☆28Updated last year