deptofdefense / dds-at-DEFCON
DDS workshops at DEFCON
☆69Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for dds-at-DEFCON
- A collection of learning resources for budding aviation security researchers☆82Updated 4 years ago
- Open source release of challenges and other code used in the 2020 Hack-a-Sat Final.☆81Updated 4 years ago
- Open source release of challenges and other code used in the Hack-A-Sat Qualifier in 2020.☆77Updated 4 months ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Open source release of challenges and other code used in the Hack-A-Sat 2 Qualifier in 2021.☆66Updated 3 years ago
- Hack A Sat 2020 Qualifier Challenges☆96Updated 2 years ago
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆45Updated 4 years ago
- ADDVulcan 2020 Hack-A-Sat writeups☆25Updated last year
- Client side tools to play the CTS contest☆44Updated 3 years ago
- Rust tool to detect cell site simulators on an orbic mobile hotspot☆40Updated 2 weeks ago
- Make your own base station to communicate with satellites!☆155Updated 2 years ago
- ☆27Updated 2 years ago
- ☆29Updated last year
- Aerospace Village Badge 2020☆28Updated last year
- hackasat-qualifier-2023☆24Updated last year
- This will be a wiki when it grows up, if it grows up☆87Updated 4 months ago
- GSExtract is a tool for converting imperfect satellite radio captures of internet traffic transmitted using Generic Stream Encapsulation …☆68Updated 3 years ago
- Public library of space documents and tutorials☆724Updated 6 months ago
- ☆18Updated 2 years ago
- Companion notebooks to the Hardware Hacking Handbook☆61Updated 3 years ago
- Supporting files for cyber challenge exercises. #nsacyber☆44Updated 6 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Operational Technology Cyber Attack Database☆44Updated 2 years ago
- Notes and resorce's for SDR/Wireless tech☆157Updated 10 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆89Updated last month
- A list of resources for those interested in hardware, embedded, and IoT security☆57Updated last month
- Advanced: Bluetooth low energy capture the flag☆52Updated last year
- Signals intelligence (SIGINT) gathering by interception of WiFi, Bluetooth and GSM☆54Updated this week
- ☆65Updated last month
- ☆32Updated last year