walletfail / bloomburgularLinks
A super micro fun implant
☆23Updated 6 years ago
Alternatives and similar repositories for bloomburgular
Users that are interested in bloomburgular are comparing it to the libraries listed below
Sorting:
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- ☆13Updated 7 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- Just for some security tools I am making since HomeBrew doesn't like non-popular tools☆9Updated 5 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆20Updated 9 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 7 years ago
- ldid and ldid2☆13Updated 7 years ago
- ☆12Updated 7 years ago
- ☆15Updated 8 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- ☆15Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago