dominicgs / BeagleDancer
A Facedancer21 expansion board for the BeagleBone.
☆22Updated 10 years ago
Alternatives and similar repositories for BeagleDancer:
Users that are interested in BeagleDancer are comparing it to the libraries listed below
- Turns virtual usbredir connections into physical ones☆11Updated 4 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- SAVIORBURST☆20Updated 9 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆26Updated 8 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- ☆13Updated 7 years ago
- ☆10Updated 7 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆34Updated 10 years ago
- ☆13Updated 10 years ago
- r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It in…☆15Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- ☆15Updated 6 years ago
- Various projects aiming at unlocking and programming the MINI54ZAN microcontroller☆18Updated 4 years ago
- ☆21Updated 8 years ago
- In memory fuzzing for embedded devices☆18Updated 12 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- A strcmp timing attack example☆9Updated 10 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Updated 9 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago