vanhoefm / macstealerLinks
☆522Updated 5 months ago
Alternatives and similar repositories for macstealer
Users that are interested in macstealer are comparing it to the libraries listed below
Sorting:
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆235Updated 2 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆469Updated this week
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆297Updated 2 months ago
- Wireless Hacking Devices Protocol client☆195Updated this week
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆455Updated 3 years ago
- A list of public attacks on BitLocker☆309Updated 4 months ago
- List of Bluetooth BR/EDR/LE security resources☆559Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,948Updated 8 months ago
- Hack-A-Sat Qualifiers Writeups☆251Updated 2 years ago
- ☆204Updated 7 months ago
- A software SIM card.☆338Updated 11 months ago
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- Damn Vulnerable UEFI☆283Updated 9 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated 11 months ago
- ☆694Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- reverse shell using curl☆206Updated 4 months ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆118Updated this week
- Bluetooth experimentation framework for Broadcom and Cypress chips.☆737Updated 10 months ago
- ☆231Updated 2 years ago
- ☆123Updated last year
- Utility to find hidden Linux kernel modules☆144Updated 6 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- A simple, very experimental TPM sniffer for LPC bus☆603Updated last year
- SensePost's modified hostapd for wifi attacks.☆570Updated 10 months ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆338Updated last year
- A WPA3 dictionary cracker☆329Updated last year
- Kernel exploitation technique☆575Updated last year
- ☆344Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆304Updated 3 years ago