vanhoefm / macstealerLinks
☆523Updated 8 months ago
Alternatives and similar repositories for macstealer
Users that are interested in macstealer are comparing it to the libraries listed below
Sorting:
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆541Updated 3 weeks ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆459Updated 3 years ago
- Wireless Hacking Devices Protocol client☆231Updated this week
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆300Updated 5 months ago
- A software SIM card.☆348Updated last year
- A WPA3 dictionary cracker☆332Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆239Updated 5 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆239Updated this week
- SkySafe Miscellaneous Reverse Engineering Blog☆765Updated last year
- ☆168Updated 3 weeks ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Bluetooth Security Assessment Methodology☆134Updated last year
- A repo for TPM sniffing greatness☆234Updated 2 months ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆341Updated last year
- ☆351Updated 2 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated last year
- ☆63Updated 2 years ago
- Enabling Geographically Decoupled Measurements in Cellular Networks☆73Updated this week
- VSS Hardware Hacking Wiki and Blog Entries☆254Updated last year
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆689Updated 4 months ago
- A list of public attacks on BitLocker☆321Updated last month
- NFC signal and protocol analyzer using SDR receiver☆479Updated last month
- ☆583Updated 2 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆510Updated last year
- Hardware Hacking Cheatsheet infograph☆154Updated last year
- ☆127Updated last year
- poc for CVE-2025-24252 & CVE-2025-24132☆123Updated 3 months ago