Simple bug with ESP8266 and I2S MEMS microphone for listening and recording Audio via UDP.
☆28Mar 3, 2026Updated this week
Alternatives and similar repositories for ESP8266-BUG-I2S-MIC
Users that are interested in ESP8266-BUG-I2S-MIC are comparing it to the libraries listed below
Sorting:
- AmbiPro captures your screen and synchronizes the colors to your led strip.☆20Sep 25, 2025Updated 5 months ago
- Simple bug using ESP32 and I2S MEMS microphone for listening and recording Audio via UDP Listener.☆20Updated this week
- Beacon monitor for ESP32 with OLED display☆24Aug 29, 2019Updated 6 years ago
- LED Top hat☆15Aug 11, 2014Updated 11 years ago
- Sidecar to perform packet capturing in Serverless (Cloud Run, Cloud Run functions, App Engine Flex), GKE, & GCE☆19Nov 20, 2025Updated 3 months ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- SSH server ready to be deployed into Cloud Run.☆15Apr 29, 2025Updated 10 months ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- personal☆12Oct 5, 2020Updated 5 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- code for my parsons (2012) class on data visualization, including in class examples, etc☆24Apr 18, 2012Updated 13 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Rainbow Fader using FastLED on Arduino☆12Feb 3, 2018Updated 8 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Network Tap based on the ZedBoard and Ethernet FMC☆15Feb 28, 2026Updated last week
- Man-in-the-middle device for attacking RFID access control systems☆16Feb 7, 2023Updated 3 years ago
- Boscloner - All in One RFID Cloning Toolkit☆16Apr 14, 2017Updated 8 years ago
- Hardware and software for smartphone sensor peripherals using the audio jack interface.☆13Jan 10, 2014Updated 12 years ago
- Source code to execute signal injection attacks against CCD image sensors☆11Aug 26, 2021Updated 4 years ago
- ESP32 and CC1101 device that continuously opens a Tesla charging port.☆16Oct 18, 2024Updated last year
- ☆13Sep 24, 2023Updated 2 years ago
- A simple arduino device for noise level detection☆13Dec 16, 2016Updated 9 years ago
- WiFi enable cheap 433MHz sensors to create a simple home alarm system.☆10May 30, 2017Updated 8 years ago
- Arduino library of patterns for FastLED☆12Mar 30, 2018Updated 7 years ago
- ☆14Feb 20, 2022Updated 4 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago