andygrove / ultimate_voice_changerView external linksLinks
Real time voice changer shield for Arduino Uno
☆34Dec 9, 2018Updated 7 years ago
Alternatives and similar repositories for ultimate_voice_changer
Users that are interested in ultimate_voice_changer are comparing it to the libraries listed below
Sorting:
- Uses the ESP 8266 to create a free Wi-Fi AP, which requires the user to "sign in," when the user logs in, all GET requests are sent to th…☆17Aug 14, 2018Updated 7 years ago
- Brute Force Attack 3 ^ 8 Remote Control☆28Feb 26, 2017Updated 8 years ago
- 使用TPYBoard v202做的deauther测试☆24Jun 10, 2017Updated 8 years ago
- 📡 Turn your Raspberry Pi into an FM transmitter broadcasting live audio from JACK☆27Jan 26, 2020Updated 6 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- implementation of the Ant BMS UART protocol for the Arudion IDE :-)☆12Oct 10, 2022Updated 3 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- DIY Arduino sample-based drum machine, using the Mozzi library☆14Mar 13, 2022Updated 3 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Completely free Text-to-Speech (TTS) models with excellent Turkish support and multilingual capabilities. No development, just a comprehe…☆15Jul 2, 2025Updated 7 months ago
- A USB FootController for the Katana MK2☆14Apr 29, 2020Updated 5 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆13Apr 20, 2023Updated 2 years ago
- Flipper Zero Protocol Pirate - work in progress by RocketGod☆36Updated this week
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆14Oct 25, 2017Updated 8 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 2 years ago
- Collection of Workflows for the iOS app Workflow (http://workflow.is)☆10Feb 19, 2016Updated 9 years ago
- Tapping the 'Tmoney' card to the NFC module displays the remaining balance on the OLED screen, offers the most intuitive way to check the…☆18Feb 7, 2026Updated last week
- A simple script for plotting the flight path of aircraft from ADS-B packet data☆12Jan 25, 2018Updated 8 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 7 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- OneWire lets you access 1-wire devices made by Maxim/Dallas, such as temperature sensors and ibutton secure memory. Library for arduino☆16Mar 17, 2013Updated 12 years ago
- A list of various eye- and head-tracking software, products, etc. ℹ️ This is just a push-mirror. We develop here: https://codeberg.org/ey…☆16Aug 28, 2025Updated 5 months ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Hardware and software for smartphone sensor peripherals using the audio jack interface.☆13Jan 10, 2014Updated 12 years ago
- clone mifare card based on arduino uno☆11May 23, 2017Updated 8 years ago
- ☆12Apr 29, 2023Updated 2 years ago
- Boscloner - All in One RFID Cloning Toolkit☆15Apr 14, 2017Updated 8 years ago