seeess / Defcon-Shoot-23-BadgeLinks
code and manual for the defcon shoot 23 badge
☆10Updated 9 years ago
Alternatives and similar repositories for Defcon-Shoot-23-Badge
Users that are interested in Defcon-Shoot-23-Badge are comparing it to the libraries listed below
Sorting:
- The 2016 Crypto and Privacy Village Blinkybadge☆12Updated 8 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆35Updated 11 years ago
- AND!XOR DEFCON 24 Badge HW and SW☆44Updated 4 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆56Updated 6 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 4 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- software for the Girl Tech IM-Me☆153Updated 9 years ago
- ☆76Updated 9 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆104Updated 4 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- The world's first Linux white-box ransomware☆63Updated 7 years ago
- ☆18Updated 8 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- The Blind Public License is a restrictive license that does not allow any person to read, view, interpret, emulate, debug, disassemble, r…☆56Updated 8 years ago
- A collection of Teensy 2.0 (C) and PC (C#) files allowing on-the-fly simulation of USB peripherals from a PC.☆48Updated 12 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- :wq☆67Updated 6 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- Motorized, portable, 3D printed, Arduino-based combination lock cracker☆240Updated 5 years ago
- ☆10Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆304Updated 2 months ago
- This repository is deprecated. Go to:☆118Updated 6 years ago
- LibOTR functionality in Irssi.☆185Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago