ESP32-DIV HaleHound Edition for Cheap Yellow Display - Multi-protocol offensive security toolkit
☆123Mar 1, 2026Updated this week
Alternatives and similar repositories for HaleHound-CYD
Users that are interested in HaleHound-CYD are comparing it to the libraries listed below
Sorting:
- ☆85Feb 25, 2026Updated last week
- An advanced WiFi scanning and packet sniffing toolkit for the ESP32-C5, featuring a cyberpunk-inspired web interface.☆37Mar 1, 2025Updated last year
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆26Updated this week
- Scripts for Bruce Firmware Devices and Flippers☆37Oct 31, 2025Updated 4 months ago
- ☆12Feb 16, 2012Updated 14 years ago
- EAS SAME to APRS Message Converter☆14Jul 13, 2020Updated 5 years ago
- Instructions for using and App download.☆25Sep 24, 2025Updated 5 months ago
- 2.4Ghz Wifi networks spot jamming device, utilizing ESP32 and nRF24L01+☆13Jan 5, 2024Updated 2 years ago
- Evil-BW16 is a dual band 2.4 Ghz and 5.8 Ghz deauther, manageable via serial, it is automated and configurable☆109Jul 28, 2025Updated 7 months ago
- Low cost aerial surveillance drone☆19Apr 22, 2023Updated 2 years ago
- Serverless personal location tracking API☆12Jun 18, 2018Updated 7 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- Amp Rack Guitar Effects Processor for Linux and Windows☆14Mar 26, 2025Updated 11 months ago
- a collection of wordlist for different projects☆12Oct 12, 2024Updated last year
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- Minigotchi ported to multiple ESP32 devices. (Main Repo (Archived) by @dj1ch)☆14Aug 24, 2025Updated 6 months ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32... T-Deck (Plus) and T-Embed (CC1101) versions are a work in progre…☆57Jun 14, 2025Updated 8 months ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- ☆11May 15, 2020Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- PortaPack - Module Develoment Kit☆20Mar 19, 2025Updated 11 months ago
- generates unique subdomain names and runs httpx on them☆17Apr 8, 2024Updated last year
- ☆10Feb 15, 2023Updated 3 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Various documentation and write-ups for challenges and research☆12Sep 26, 2019Updated 6 years ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- self contained mfkey tool for all 3 mfkeys☆18Sep 20, 2024Updated last year
- JS Finding can be used to extract JavaScript (JS) files from either a single domain URL or a list of domains. The tool supports various e…☆48Apr 29, 2024Updated last year
- A Game-Inspired Gadget for Remote Control of Devices☆12Feb 6, 2023Updated 3 years ago
- Alynx Nethunter kernel for sunfish pixel 4a☆14Feb 5, 2025Updated last year
- My public talks☆14Oct 1, 2024Updated last year
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago