Control Frame Attack Vulnerability Detection Tool (GitLab Mirror)
☆12Dec 2, 2024Updated last year
Alternatives and similar repositories for proximoth
Users that are interested in proximoth are comparing it to the libraries listed below
Sorting:
- An active attack tool against Wi-Fi networks with internal CMD commands☆72Mar 5, 2025Updated last year
- Never lose your favorite avatars in VRChat!☆12Jun 9, 2024Updated last year
- A console text editor written in C.☆46Jan 4, 2026Updated 2 months ago
- Virtual machine image for ITU CS courses☆10Oct 21, 2020Updated 5 years ago
- Script to convert .kn5 files (Assetto Corsa) to .obj☆30Dec 2, 2023Updated 2 years ago
- ☆10Apr 24, 2022Updated 3 years ago
- An AR-15 lower optimized for an Atchission/CMMG .22 LR conversion kit☆22Feb 4, 2023Updated 3 years ago
- Camouflage YOLO - (CAMOLO) trains adversarial patches to confuse the YOLO family of object detectors.☆12Oct 20, 2022Updated 3 years ago
- Modular Antenna Tracker Caddy☆11Nov 14, 2023Updated 2 years ago
- Image builder for the EZ-Wifibroadcast project☆20Jan 9, 2019Updated 7 years ago
- Quadruped Robot Dogs + ROS & Gelblasters == Dystopian Future "Fox" Hunt☆11Sep 28, 2023Updated 2 years ago
- Nano F4 Flight Controller Board☆23Jun 21, 2017Updated 8 years ago
- Tool for capturing and mapping locations of SSIDs from wireless beacons and client requests☆25Mar 4, 2018Updated 8 years ago
- This is mirror of source codes, executables and explanatory texts taken from the original ConsoleSoft by Carlos Montiers https://web.arch…☆11May 17, 2022Updated 3 years ago
- C library to work with complex numbers.☆12Jan 1, 2025Updated last year
- ☆19Dec 15, 2018Updated 7 years ago
- License plate number recognition using OpenAlpr☆22Updated this week
- Minecraft clone writen in windows batch files☆12May 30, 2025Updated 9 months ago
- Jamming Detection in IoT Wireless Networks using TinyML -- Code and Dataset☆22Feb 9, 2025Updated last year
- Electron Radio Hacker - A simple alternative to URH☆50Aug 23, 2023Updated 2 years ago
- An extensible and highly configurable Bongo Cat overlay☆17Apr 16, 2025Updated 11 months ago
- This repository will contain multiple scripts to handle converting many different data streams, files and formats into TAK ecosystem frie…☆20Feb 5, 2024Updated 2 years ago
- Development tool for text protection within batch files.☆15Sep 13, 2017Updated 8 years ago
- ☆31Apr 14, 2017Updated 8 years ago
- The entire <math.h> library from scratch.☆15Jan 27, 2025Updated last year
- Overview of the Low Altitude Disaster Imagery (LADI) Dataset☆38Mar 13, 2025Updated last year
- This project is based upon the trick that, how to hack WI-FI with CMD. The main purpose behind, creating wifi hacking tool with cmd tool …☆363Mar 8, 2025Updated last year
- OctoWatch is a quick and simple dashboard for monitoring 3D printers, in your network. It uses OctoPrint ’s API, and displaying live print…☆16Apr 2, 2025Updated 11 months ago
- Use TensorFlow and convolutional neural networks with PowerAI to classify radio signals from outer space☆19Apr 22, 2019Updated 6 years ago
- Send and receive data between TAK clients (ATAK, iTAK, and WinTAK) and Meshtastic nodes☆53Jan 6, 2026Updated 2 months ago
- Engines for Batch Script-based games.☆12Feb 5, 2018Updated 8 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Documentation of antsdr devices☆29Oct 22, 2025Updated 5 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Single repository to store all of the necessary elements required to create a Raspberry Pi based simple IMSI catcher. All credit to the i…☆33Dec 14, 2021Updated 4 years ago
- Control your drone over the internet☆26Sep 16, 2025Updated 6 months ago
- ROS2 Humble desktop workspace for integration with PX4 simulation☆27Mar 11, 2025Updated last year
- Ham radio transceiver QRPp based on Raspberry Pi☆45Jun 8, 2020Updated 5 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago