zadewg / GS-LOCLinks
Apple geolocation services reverse engineering. Database scraper.
☆64Updated last year
Alternatives and similar repositories for GS-LOC
Users that are interested in GS-LOC are comparing it to the libraries listed below
Sorting:
- Global key for HID iCLASS☆42Updated 8 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆114Updated 6 years ago
- Breaking the iCloud Keychain Artifacts☆102Updated last year
- macOS Client-Side Phishing lock screen payload☆128Updated 6 years ago
- Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS☆197Updated 5 years ago
- Complete SMS packet manipulation☆113Updated 3 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆85Updated 2 years ago
- ☆20Updated 3 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server…☆147Updated 2 years ago
- Yet another frida based iOS dumpdecrypted☆35Updated 6 years ago
- Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat☆106Updated 8 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆63Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- Nmap for Bluetooth Low Energy☆196Updated last year
- ☆46Updated 5 years ago
- File transfer via DNS☆73Updated 8 years ago
- A simple wrapper for l2ping which shows rssi☆18Updated 4 years ago
- ☆127Updated 6 years ago
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆121Updated 3 weeks ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- macOS Privilege Escalation Helper☆142Updated 5 months ago
- Mac OS X Memory Analysis Toolkit☆171Updated 8 years ago
- Krack POC☆125Updated 7 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 7 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆182Updated 3 years ago
- Gets in the way of your victim's traffic and out of yours☆28Updated 5 years ago