freewili / bracelet_subfilesLinks
.sub files for the LED bracelets distributed at DEFCON
☆17Updated last month
Alternatives and similar repositories for bracelet_subfiles
Users that are interested in bracelet_subfiles are comparing it to the libraries listed below
Sorting:
- An Open-Source Door Simulator for RFID/PACS Training☆134Updated 10 months ago
- ☆28Updated 2 years ago
- This will be a wiki when it grows up, if it grows up☆94Updated last month
- OSDP attack tool (and the Elvish word for friend)☆100Updated 2 years ago
- ☆39Updated 3 years ago
- Writeup for the DEF CON 30 badge challenge☆71Updated 3 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆54Updated 5 years ago
- Default Password Generator for Time Warner / Spectrum Routers☆17Updated 8 years ago
- A simulation of the RFCTF KOTH game.☆10Updated 5 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆80Updated 10 months ago
- ☆148Updated last year
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- ☆20Updated last year
- ☆73Updated 4 years ago
- Evil Crow Cable Pro device☆119Updated 5 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆23Updated 9 months ago
- Z-Wave Packet Interception and Injection Tool☆35Updated 9 years ago
- Notes and resorce's for SDR/Wireless tech☆205Updated 5 months ago
- A simple wrapper for l2ping which shows rssi☆19Updated 4 years ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated 11 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 7 months ago
- ☆15Updated 8 months ago
- ☆36Updated last year
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆47Updated 5 years ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆152Updated this week