walletfail / bloomburgularLinks
A super micro fun implant
☆23Updated 6 years ago
Alternatives and similar repositories for bloomburgular
Users that are interested in bloomburgular are comparing it to the libraries listed below
Sorting:
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Pre-OS microcode updater☆43Updated 7 years ago
- Sensor software☆68Updated 4 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- ☆50Updated 3 weeks ago
- ☆47Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- A shellcode testing harness.☆70Updated last year