zbrogz / Curie-Car-Keyless-EntryLinks
Automatically unlock your car using Arduino 101's BLE proximity and key fob iPhone app.
☆30Updated 8 years ago
Alternatives and similar repositories for Curie-Car-Keyless-Entry
Users that are interested in Curie-Car-Keyless-Entry are comparing it to the libraries listed below
Sorting:
- RfCat - swiss-army knife of ISM band radio☆23Updated 3 years ago
- ☆17Updated 6 years ago
- RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC☆33Updated 2 years ago
- car hacking tools☆110Updated last year
- Relay Attack on Vehicle Passive Keyless Entry System☆39Updated 7 years ago
- Ultimate CAN Bus tool for Car hacking. Full Featured hardware & software.☆47Updated 8 years ago
- A jamming-and-replay attack using SDR☆19Updated 6 years ago
- ☆27Updated 5 years ago
- Usage of Software Defined Radio to capture the Key Fob frequencies and implementation of MiTM (Man-in-the-middle) , DoS (Denial of Servic…☆31Updated 5 years ago
- Dumps from a collection of hotel room keys for analysis☆13Updated 5 years ago
- NFCopy85 is a 10 dollars device to make replay attacks against NFC payment systems.☆44Updated 6 years ago
- Integrating some Major Malfunction tools for Mag-stripe info☆57Updated 8 years ago
- Open Source Hardware using an ESP-12 with CNLohr's USB implementation.☆33Updated 6 years ago
- CarPwner is a python script to "jam", capture, and replay rolling code signals using two yard stick one devices and rfcat.☆20Updated 4 years ago
- ECE 209 Security of Embedded Systems Project☆16Updated 7 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Updated 8 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Updated 7 years ago
- MagSpoof for Raspberry PI GPIO☆64Updated 9 years ago
- Experiments with the Yard Stick One, replay attacks☆18Updated 8 years ago
- Radio Signals Recognition Manual☆28Updated 3 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Updated 6 years ago
- Proxmark 3☆22Updated 6 years ago
- Use encoder feedback to try to glean the internal workings of a combination safe.☆39Updated 8 years ago
- Bypassing Rolling Code Systems☆43Updated 6 years ago
- A GNU Radio flowgraph that implement an attack to Remote Keyless Entry (RKE) systems using Roll Jam technique☆66Updated 5 years ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Updated 4 years ago
- Remote Keyless Entry Systems☆17Updated 8 years ago
- Use ELM327 bluetooth device to evaluate all packages sent through CAN on OBD2 interface.☆57Updated 7 years ago
- NFC transaction copier implementing Visa MSD protocol☆46Updated 6 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆36Updated 8 years ago