☆49Jun 5, 2016Updated 9 years ago
Alternatives and similar repositories for inputProtectionShield
Users that are interested in inputProtectionShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be…☆791Oct 30, 2023Updated 2 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- BadUSB for the Arduboy game console☆12Jul 15, 2022Updated 3 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Aug 15, 2016Updated 9 years ago
- BADFET☆45Jul 12, 2017Updated 8 years ago
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Identify Serial Wire Debug (SWD) clock and io lines using your favorite Arduino.☆65Jan 4, 2023Updated 3 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- 2 hour crash course in FPGAs☆99Oct 28, 2021Updated 4 years ago
- USB-JTAG interface transferred from code.google.com/p/opendous-jtag☆14May 4, 2015Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- ☆20Dec 23, 2019Updated 6 years ago
- Simple Simulator of ARMv6m instructions☆18May 23, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple software tools for encoding and decoding dumps of NAND memory chips using implemented error correcting codes (ECC)☆98Sep 30, 2021Updated 4 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- MPTCP for OpenWRT - Just in work☆18May 31, 2017Updated 8 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- Simple voltage glitcher implementation for the Lattice iCEstick Evaluation Kit☆62Jan 30, 2020Updated 6 years ago
- Glitchy is a no-code visual interface to the world of microcontroller glitching.☆98Nov 21, 2022Updated 3 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Jan 4, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bare metal ARMv7 MMU Translation Table dumper☆19Sep 5, 2014Updated 11 years ago
- Research on WebAssembly☆41Jun 9, 2022Updated 3 years ago
- Identify JTAG ports using your favorite Arduino.☆79Dec 12, 2022Updated 3 years ago
- This repository contains the companion code from the "All your tracing are belong to BPF" blog posts☆19Apr 12, 2023Updated 2 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Experiments getting a Cypress FX3 SuperSpeed USB3 dev kit to behave as a logic analyzer.☆29Oct 2, 2017Updated 8 years ago
- Secure components enabling application authentication, secure file storage, app level file-based keychain, and shredding for files on dis…☆60Sep 11, 2023Updated 2 years ago