bgraydon / lockview
A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a supporting tool for my DEF CON 28 talk on key space hacking - updated with interactive / moving elements to support my DEF CON 30 talk on moving elements.
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for lockview
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆29Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Simple Go Discord Bot☆21Updated last year
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆22Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- crappy set of one-off scripts and tools used for reversing and vulnerability research.☆11Updated 2 years ago
- transparent TCP-to-proxy redirector☆16Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- The Multiplatform Linux Sandbox☆15Updated 11 months ago
- Converted the text list to binary to save space☆10Updated 2 months ago
- Upload external IP so you can find your devices elsewhere☆15Updated 7 months ago
- The hidden mstsc recorder player☆28Updated 4 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Still point in moving world.☆50Updated 2 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆20Updated 2 years ago
- ☆16Updated 6 years ago