akaStanley / TalDoorLinks
GatekeeperV2- POE powered NFC Door lock system using the PocketBeagle
☆14Updated 7 years ago
Alternatives and similar repositories for TalDoor
Users that are interested in TalDoor are comparing it to the libraries listed below
Sorting:
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- A sleep-aware-sleep() function☆12Updated 3 months ago
- Work with spelling errors.☆13Updated 10 years ago
- Thought experiment / prototype that performs random Google searches, clicks to increase privacy☆96Updated 8 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- Grab functions from radare2☆10Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- ☆13Updated 7 years ago
- A Python implementation of JOSE☆14Updated 6 years ago
- ☆21Updated 5 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 8 years ago
- Scripts and tools for macOS reversing☆14Updated 9 years ago
- A simple c hash implementation using the DJB string hashing function.☆11Updated 12 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 3 months ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- socat version 2☆10Updated 12 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- bradwii on STM32☆13Updated 10 years ago
- Golang interface to 1Password sqlite databases☆17Updated 8 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 3 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 6 months ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Updated 7 years ago
- A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform fro…☆16Updated 6 years ago
- An implementation of jpnevulator in Python☆21Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Serve files over TFTP from HTTP.☆24Updated last year
- encrypt and decrypt small files using OpenSSH keys☆70Updated 11 years ago
- sign elf binaries with GPG☆18Updated 8 years ago