A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences
☆26Jun 24, 2017Updated 8 years ago
Alternatives and similar repositories for NMEAdesync
Users that are interested in NMEAdesync are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jul 9, 2017Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆23Mar 26, 2017Updated 9 years ago
- 1090ES ADS-B Out Add-on☆13Sep 15, 2019Updated 6 years ago
- ☆16Mar 31, 2017Updated 9 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Remote Keyless Entry Systems☆18Mar 26, 2017Updated 9 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- ☆23Jun 22, 2024Updated last year
- GPS Spoofer Catcher, the GPS IDS.☆91Mar 26, 2017Updated 9 years ago
- Produces zero-dependencies node modules☆16Oct 25, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 9 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- keyfob rx☆25Mar 30, 2011Updated 15 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- CANAPE Network Testing Tool☆184Jan 18, 2018Updated 8 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Buspirate support in python3 for I2C scripting☆11May 23, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- Pothos bindings for GNU Radio blocks☆12Dec 28, 2020Updated 5 years ago
- Tools for flashing a USR5686G modem☆20Aug 6, 2020Updated 5 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆50Jun 25, 2020Updated 5 years ago
- Proxmark3 rvd4.0 adaptation based iceman fork☆14Sep 3, 2018Updated 7 years ago
- The BUSSide☆19Oct 10, 2021Updated 4 years ago
- Collection of projects for adding GNURadio to a REDHAWK Domain as a Component, thus enabling easy installation of flowgraphs into REDHAWK…☆15Jul 15, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Polymer-based web component displaying a circular progress bar.☆11Jan 15, 2021Updated 5 years ago
- ☆106Feb 2, 2016Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Presented hardware reverse engineering workshops since 2019☆63Aug 8, 2024Updated last year
- ☆13Aug 15, 2016Updated 9 years ago
- Extract DfuSe images (.dfu) into plain binary files☆20Sep 30, 2021Updated 4 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Jul 15, 2018Updated 7 years ago