A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework
☆42Sep 1, 2020Updated 5 years ago
Alternatives and similar repositories for beekeeperwids
Users that are interested in beekeeperwids are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆88Jun 1, 2014Updated 11 years ago
- A few ZigBee Tools to compliment KillerBee☆57Jun 27, 2016Updated 9 years ago
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Jul 30, 2019Updated 6 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆165Mar 15, 2018Updated 8 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆25Aug 1, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- With ViewTool Hollong BLE Sniffer hardware to create individual application to capture full 37,38,39 channels BLE advertising data simult…☆16Dec 23, 2018Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆56Jan 31, 2019Updated 7 years ago
- GUI Framework on top of Killerbee☆83Apr 25, 2017Updated 9 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆30Sep 2, 2021Updated 4 years ago
- QT based GUI for Chameleon-RevE-Rebooted & Chameleon RevG - written in Golang☆33Jan 24, 2021Updated 5 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- Open source SDR LTE software suite☆19Jan 11, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆47Oct 25, 2019Updated 6 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆31Dec 17, 2018Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆30Apr 23, 2025Updated last year
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- Bluetooth PIN and LINK-KEY Cracker☆53May 12, 2014Updated 12 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 无线局域网入侵检测系统☆12Oct 25, 2018Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆42May 30, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Collection of scripts to interact with the eZ430 TI watch☆61May 16, 2012Updated 14 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆37Feb 14, 2017Updated 9 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46May 30, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OsmoTRX - GSM base station transceiver☆22Apr 4, 2019Updated 7 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- ICS protocol traffic generators☆23Oct 25, 2023Updated 2 years ago
- Python Tools for UART Hacking☆27Oct 15, 2020Updated 5 years ago
- Cyber-Physical System Models of the Grid☆31Apr 8, 2021Updated 5 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Oct 18, 2014Updated 11 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 4 months ago