walletfail / bloomburgularLinks
A super micro fun implant
☆23Updated 6 years ago
Alternatives and similar repositories for bloomburgular
Users that are interested in bloomburgular are comparing it to the libraries listed below
Sorting:
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- ☆15Updated 9 years ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- A shellcode testing harness.☆70Updated last year
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆59Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆48Updated last month
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23Updated 16 years ago
- ☆25Updated last month
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Wi-Fi Covert Channel Chat demo application☆71Updated 8 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago