t94j0 / homebrew-securityLinks
Just for some security tools I am making since HomeBrew doesn't like non-popular tools
☆9Updated 5 years ago
Alternatives and similar repositories for homebrew-security
Users that are interested in homebrew-security are comparing it to the libraries listed below
Sorting:
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- ☆13Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 8 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- Network white noise collector☆19Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆11Updated 10 months ago
- Code etc for the badge creation and payloads☆11Updated 4 years ago
- ☆16Updated 9 years ago
- A super micro fun implant☆23Updated 6 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A small script to automate project folder management and basic tool output☆35Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Nirsoft Package to create an powerful usb sniffer in background☆13Updated 10 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago