Reprap FW with look ahead. SDcard and LCD support. It works on Gen6, Ultimaker, RAMPS and Sanguinololu
☆59Sep 7, 2021Updated 4 years ago
Alternatives and similar repositories for Marlin
Users that are interested in Marlin are comparing it to the libraries listed below
Sorting:
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 5 years ago
- ☆26Oct 1, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- OpenBeacon.org Active 2.4 GHz RFID tracking for nRF51822☆12Jun 4, 2015Updated 10 years ago
- Mirror of https://github.com/iSECPartners/ios-ssl-kill-switch/☆16Dec 28, 2015Updated 10 years ago
- Hack conventional scales to connect to computer via usb serial and/or bluetooth☆16Feb 18, 2020Updated 6 years ago
- Desfire card library for Python☆21Aug 13, 2017Updated 8 years ago
- A completely new web interface for the Duet electronics☆18Jun 5, 2020Updated 5 years ago
- This is a shared native SQLite library used for Couchbase Lite Android/Java.☆20Jun 8, 2020Updated 5 years ago
- Twerp is the telephone hackers toolkit. It's also a command-line app for Twilio, written in Python☆27Nov 9, 2020Updated 5 years ago
- Automated man-in-the-middle attack tool.☆52Sep 4, 2014Updated 11 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- RFC6455 compliant parser for websocket messages☆50Oct 13, 2017Updated 8 years ago
- shape recognition using opencv, webcam, python☆27Feb 27, 2016Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- MXET-300 Mobile Robotics Class utilizing the SCUTTLE Platform☆13Jun 16, 2025Updated 8 months ago
- ☆32May 26, 2025Updated 9 months ago
- ChipWhisperer CW308 UFO Target Hardware Files☆41Aug 13, 2025Updated 6 months ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Quick implementation of the Apple/Google joint contact tracing beacon specification (now known as "Exposure Notification")☆34Jul 17, 2020Updated 5 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- The voice project of Embedded System use STM32☆11Dec 25, 2013Updated 12 years ago
- Brute forcing scripts for bad CTF problems☆47May 18, 2020Updated 5 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆49Feb 20, 2017Updated 9 years ago
- Show info about the author by facebook photo url☆40Apr 7, 2017Updated 8 years ago
- TinyCore boards / attiny 1 series Core, Arduino IDE Core, targets ATtiny 417 / 814 / 816 / 817 / 1614 / 1616 / 1617 / 3217 and similar MC…☆39Feb 21, 2021Updated 5 years ago
- Python tools for manipulating Mikrotik NPK format☆85Jun 9, 2015Updated 10 years ago
- A simple bot that open chests for you.☆14Nov 3, 2018Updated 7 years ago
- ☆13Jul 29, 2021Updated 4 years ago