NickEngmann / Jackp0tLinks
Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within a few inches of each other.
☆36Updated 6 years ago
Alternatives and similar repositories for Jackp0t
Users that are interested in Jackp0t are comparing it to the libraries listed below
Sorting:
- How to create stickers and files for creating stickers☆32Updated 2 years ago
- How I hacked mine..☆21Updated 6 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- defcon 27 badge☆25Updated 6 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆12Updated 6 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- A tool for processing a lot of pcaps using tshark☆155Updated 2 years ago
- DEF CON Hacker Tracker☆110Updated 3 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Duct Tape Command and Control!☆96Updated 6 months ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- Status: summoned and unleashed upon DEF CON 26☆24Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- Stargate☆96Updated 9 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- EM4100 RFID Cloner Kit☆63Updated 2 years ago
- A Bluetooth Low Energy device for interfacing with Wiegand☆263Updated 8 years ago
- Tool to read and write iclass cards without the master key☆108Updated 6 years ago
- ☆147Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- ☆208Updated 7 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆72Updated 9 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- DefCon 26 Badge Hacking☆38Updated 7 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 9 years ago
- For importing, searching, and managing public password breach data☆160Updated 2 years ago