MAVProxyUser / SilverPushUnmaskedLinks
SilverEdge Inc. SilverPush Demo Apps (unmasked)
☆84Updated 9 years ago
Alternatives and similar repositories for SilverPushUnmasked
Users that are interested in SilverPushUnmasked are comparing it to the libraries listed below
Sorting:
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆56Updated 6 years ago
- Demodulate on/off keying☆26Updated 9 years ago
- RF retroreflectors☆100Updated 8 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 4 years ago
- ☆50Updated 11 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago
- Cyborg Unplug firmware files☆175Updated 7 years ago
- ☆54Updated 11 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- ☆237Updated 8 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 3 years ago
- Digistump Oak - Telemetry over Opportunistic WiFi Links (ESP8266)☆144Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆71Updated 8 years ago
- EM4100 RFID Cloner Kit☆63Updated 2 years ago
- ☆31Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- SSID Probe Request Collection Workshop☆142Updated 4 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Updated 8 years ago
- Repository for documentation and code around the Onity HT locks☆22Updated 12 years ago
- ☆76Updated 9 years ago
- ☆25Updated 7 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- ☆49Updated 8 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago