whad-team / whad-clientLinks
Wireless Hacking Devices Protocol client
☆216Updated this week
Alternatives and similar repositories for whad-client
Users that are interested in whad-client are comparing it to the libraries listed below
Sorting:
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆206Updated last month
- An Open-Source Door Simulator for RFID/PACS Training☆129Updated 8 months ago
- Bluetooth Security Assessment Methodology☆132Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆96Updated 6 months ago
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆28Updated last week
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆490Updated last month
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆50Updated 11 months ago
- ☆166Updated 3 months ago
- WHAD-enabled firmware for nRF52840 dongle, allowing to sniff and inject packets from multiple wireless protocols (e.g. BLE, Zigbee, Enha…☆27Updated last week
- A repo for TPM sniffing greatness☆232Updated last month
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆41Updated 6 months ago
- Evil Crow Cable Pro device☆117Updated 4 months ago
- Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game w…☆220Updated last year
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆79Updated 9 months ago
- ST25TB / SRx NFC Emulator / Initiator based on TI TRF7970A with MSP430☆40Updated 3 weeks ago
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providi…☆270Updated 2 weeks ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆299Updated 3 months ago
- Collection of FCC IDs for car keyfobs☆49Updated 4 months ago
- poc for CVE-2025-24252 & CVE-2025-24132☆113Updated 2 months ago
- OSDP attack tool (and the Elvish word for friend)☆100Updated last year
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆22Updated last year
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆59Updated 3 years ago
- ☆209Updated 11 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆75Updated 9 months ago
- REplay is a reverse engineering playground that has 3 separate levels and acts as a fancy little playground mimicking real world reverse …☆16Updated last year
- BLE pentesting scripts☆70Updated 2 years ago
- ☆123Updated last year
- uses the atom gps kit to wardrive and give status via the leds☆27Updated last year
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆143Updated 3 months ago
- quick and dirty canbus h4xing framework☆142Updated 9 months ago