ussjoin / reticle
Reticle is a C&C network for small devices that want to be friends.
☆89Updated 10 years ago
Alternatives and similar repositories for reticle:
Users that are interested in reticle are comparing it to the libraries listed below
- ☆76Updated 9 years ago
- Wiegotcha: Long Range RFID Thief☆230Updated 3 years ago
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆359Updated 11 years ago
- RF retroreflectors☆100Updated 8 years ago
- ☆12Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆115Updated 6 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆332Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- Global key for HID iCLASS☆41Updated 8 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆44Updated 6 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆103Updated 8 years ago
- Stargate☆94Updated 8 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆434Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- #CyberBarcode☆65Updated last year
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆85Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Topguw implements Gr-gsm tools in Java and makes possible to uses to gsm data☆15Updated 6 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- ☆32Updated 10 years ago
- Converts and analyzes flight paths for possible surveillance activity - prototype☆24Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆71Updated 8 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- Helper scripts for RfCat devices☆209Updated 7 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago