Skip to main content
Run any Skill in Manus
with one click
$pwd:

offensive-z-wave

// Z-Wave attack methodology — sniffing with Z-Force / EZ-Wave / RTL-SDR + ZniffMobile, S0 (legacy) network-key derivation flaw and key reuse, S2 (modern) ECDH commissioning analysis, replay/injection on unauthenticated nodes, default-key brute-force on test deployments, and home-automation hub pivots. Use when targeting Z-Wave smart home devices (door locks, sensors, garage controllers) — common in mid-2010s smart home deployments still in production.

$ git log --oneline --stat
stars:1,187
forks:206
updated:May 6, 2026 at 08:09
SKILL.md
readonly