sh0ckSec / RFID-GooseneckLinks
Full Build Guide for making your own RFID Gooseneck Long Range Reader!
☆61Updated 5 months ago
Alternatives and similar repositories for RFID-Gooseneck
Users that are interested in RFID-Gooseneck are comparing it to the libraries listed below
Sorting:
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- Evil Crow Cable Pro device☆132Updated 2 months ago
- Bluetooth Security Assessment Methodology☆147Updated last week
- An Open-Source Door Simulator for RFID/PACS Training☆136Updated last year
- ☆41Updated 4 years ago
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆45Updated 3 years ago
- Wireless Hacking Devices Protocol client☆275Updated this week
- Collection of FCC IDs for car keyfobs☆57Updated 9 months ago
- This will be a wiki when it grows up, if it grows up☆95Updated 5 months ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆52Updated 3 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆86Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Updated 2 months ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆103Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆269Updated this week
- Detect Stalkers with Wardriving, using Python☆46Updated 2 years ago
- ☆20Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆46Updated 11 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated this week
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 3 years ago
- karma WiFi attack implementation☆55Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated this week
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆52Updated last year
- ☆22Updated last year
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆18Updated 2 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆108Updated 3 months ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated 2 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆167Updated 4 months ago