walletfail / bloomburgularLinks
A super micro fun implant
☆23Updated 6 years ago
Alternatives and similar repositories for bloomburgular
Users that are interested in bloomburgular are comparing it to the libraries listed below
Sorting:
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 8 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆105Updated 2 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆58Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23Updated 16 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- ☆15Updated 8 years ago
- ☆44Updated last week
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- ☆16Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- ANWI - All New Wireless IDS☆28Updated 6 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 9 years ago