vanhoefm / macstealerLinks
☆521Updated 9 months ago
Alternatives and similar repositories for macstealer
Users that are interested in macstealer are comparing it to the libraries listed below
Sorting:
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆460Updated 3 years ago
- Wireless Hacking Devices Protocol client☆250Updated last week
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆592Updated 2 months ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆304Updated 6 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆245Updated 6 months ago
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆250Updated this week
- A software SIM card.☆355Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆220Updated 2 years ago
- ☆352Updated 2 years ago
- A WPA3 dictionary cracker☆338Updated 2 years ago
- ☆174Updated 3 weeks ago
- NFC signal and protocol analyzer using SDR receiver☆505Updated this week
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆60Updated 2 months ago
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆517Updated last year
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆340Updated 2 years ago
- ☆588Updated 3 months ago
- ☆711Updated last year
- Bluetooth Security Assessment Methodology☆137Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,052Updated last year
- Network Security Sniffer☆831Updated 2 weeks ago
- A list of public attacks on BitLocker☆387Updated 2 months ago
- ☆128Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆269Updated last month
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- ☆230Updated last year
- A repo for TPM sniffing greatness☆238Updated last month
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆516Updated last year