tresacton / bsides2017presentationLinks
Breaching physical security, and generally causing mayhem, with wireless signals
☆14Updated 8 years ago
Alternatives and similar repositories for bsides2017presentation
Users that are interested in bsides2017presentation are comparing it to the libraries listed below
Sorting:
- swiss army knife of ISM RF!☆24Updated 7 years ago
- Kerby - Light weight video surveillance system.☆9Updated 16 years ago
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆28Updated 8 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- MouseJack NES controller firmware and build guide.☆35Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆53Updated 8 years ago
- Magnetic Pentesting tool for Raspberry Pi☆60Updated 4 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Bluetooth Recon Script☆25Updated 9 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆25Updated 8 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- SAVIORBURST☆21Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- ☆10Updated 7 years ago
- USB bootloader for the CC1111 RF SoC (rfcat version)☆33Updated last year
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆35Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Maltego with a twist of wireless☆26Updated 10 years ago