deviantollam / MastodonLinks
Information I give to people who are moving from Twitter to Mastodon
☆16Updated 2 years ago
Alternatives and similar repositories for Mastodon
Users that are interested in Mastodon are comparing it to the libraries listed below
Sorting:
- Dimensional Drawings for the "Fire Plug" Padlock Core Tool☆18Updated 3 years ago
- This is a very simple and (hopefully) useful way to cheaply and quickly hold KIK lock cylinders in setting such as lockpick villages, sch…☆22Updated 2 years ago
- a copy of TOOOL's "Ultimate Handcuff Key" diagram from 2009☆66Updated 3 years ago
- design files and information for anyone who wants to create their own #TastingTurntable like the one I've shown on social media☆27Updated 4 years ago
- Blind Reverse Engineering a Wireless Protocol - or - Amateur Signals Intelligence☆22Updated 11 years ago
- A collection of learning resources for budding aviation security researchers☆95Updated 5 years ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆18Updated 5 years ago
- ☆10Updated 5 years ago
- A memorial site for Hackers and Infosec people who have passed☆138Updated last week
- This will be a wiki when it grows up, if it grows up☆94Updated last month
- ☆20Updated 2 years ago
- Random files such as wordlists which maybe be useful for playing our game☆23Updated last month
- Cutting measurements and instructions for creation of "Super Bump" Keys☆63Updated 3 years ago
- Hak5 WiFi Coconut Userspace☆131Updated last year
- List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its in…☆67Updated 3 years ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- Publicly accessible version of the FiGHT website.☆14Updated 2 months ago
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆50Updated 5 years ago
- DDS workshops at DEFCON☆80Updated last year
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆66Updated last week
- DC27 MULTI PASS Badge☆17Updated 6 years ago
- Various components we use in labs☆10Updated 4 years ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆74Updated 10 months ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Updated 2 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- 3D printable design to adapt Lishi 6-pin picks for use in 5-pin locks☆85Updated last year
- RasPwn OS☆62Updated 8 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆14Updated 8 months ago
- ✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberr…☆222Updated last year
- A simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.☆31Updated 2 years ago