tresacton / bsides2017presentation
Breaching physical security, and generally causing mayhem, with wireless signals
☆13Updated 8 years ago
Alternatives and similar repositories for bsides2017presentation:
Users that are interested in bsides2017presentation are comparing it to the libraries listed below
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Arduino sketches and Perl script to program flash on Nordic nRF24LE1 wireless SOC☆19Updated 10 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Updated 9 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- ultrafast single TCP packet audio/visual experience☆29Updated 7 years ago
- Kerby - Light weight video surveillance system.☆9Updated 15 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆27Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆40Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- SAVIORBURST☆21Updated 9 years ago
- wireless client identification☆18Updated 10 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆35Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce☆9Updated 8 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Python-Based Tool for finding intermittent radio waveforms within IQ files☆19Updated 5 years ago
- "T10" postal service master key, should open most of mailbox in France.☆16Updated 9 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆48Updated 7 years ago
- Software, firmware and hardware designs for Ubertooth☆20Updated 9 years ago
- Ubertooth library for Android☆38Updated 12 years ago
- Yate BTS☆20Updated 6 years ago