Attacks against weak 802.11 Random Number Generators
☆25Feb 8, 2017Updated 9 years ago
Alternatives and similar repositories for broadkey
Users that are interested in broadkey are comparing it to the libraries listed below
Sorting:
- Modified drivers to reliably perform fragmentation and aggregation vulnerability tests☆12Jan 7, 2023Updated 3 years ago
- Single hashcat rule file containing all possible rules.☆10Oct 20, 2015Updated 10 years ago
- GUI wireless 802.11 penetration tool☆12Oct 7, 2016Updated 9 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Two codes to lock iPhone and Android devices using WhatsApp☆12Aug 29, 2022Updated 3 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Wi-Fi Covert Channel Chat demo application☆72Sep 20, 2017Updated 8 years ago
- documents and specifications☆35Jun 29, 2018Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆143Oct 12, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Creates a series of empty folders named after default keyspaces.☆12Nov 13, 2015Updated 10 years ago
- The 802.11 Hacking Repo.☆42Aug 10, 2015Updated 10 years ago
- Open framework to use DESfire cards as secure pseudonymous authentication tokens.☆23Apr 21, 2021Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- A small GUI tool for converting between cap and hccap files.☆41Dec 30, 2015Updated 10 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆27Apr 2, 2016Updated 9 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆52Jan 7, 2014Updated 12 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- Everything about Parasite and more.☆21Apr 7, 2016Updated 9 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- giskismet – Wireless recon visualization tool☆55Aug 26, 2016Updated 9 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago