walletfail / bloomburgularLinks
A super micro fun implant
☆23Updated 7 years ago
Alternatives and similar repositories for bloomburgular
Users that are interested in bloomburgular are comparing it to the libraries listed below
Sorting:
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- ☆47Updated 6 years ago
- Magnetic stripe spoofer implementing audio waves.☆40Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Learning about disassembling☆20Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- ☆23Updated 7 years ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23Updated 16 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Trying to hack into keyboards☆86Updated 7 years ago
- Executables that execute other stuff☆54Updated 7 years ago
- USB armory Debian base image☆84Updated 2 months ago
- ANWI - All New Wireless IDS☆28Updated 2 months ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- ☆84Updated 7 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- Malduino Elite firmware☆46Updated 8 years ago