Reverse engineering various bits and pices of the 3rd gen amazon alexa echo dot
☆18May 21, 2025Updated 9 months ago
Alternatives and similar repositories for no-alexa
Users that are interested in no-alexa are comparing it to the libraries listed below
Sorting:
- ☆20Feb 25, 2026Updated last week
- LLM Frontend for Power Users.☆12Feb 7, 2024Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Some learning materials, notes and scripts about the programming and security of microcontroller.☆15Mar 15, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Large language models (LLMs) made easy, EasyLM is a one stop solution for pre-training, finetuning, evaluating and serving LLMs in JAX/Fl…☆11Apr 26, 2023Updated 2 years ago
- Antenna analyzer based on RigExpert Zero II and Arduino☆13Jan 25, 2024Updated 2 years ago
- one-click deepfake (face swap)☆10May 30, 2023Updated 2 years ago
- is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)☆13Oct 3, 2024Updated last year
- This program implements a nondeterministic Turing machine simulator in C.☆24Oct 14, 2018Updated 7 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Mini CTF for TempleOS☆11Jun 19, 2020Updated 5 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- ☆12Feb 18, 2023Updated 3 years ago
- Proof of concept python script for regreSSHion exploit.☆10Oct 19, 2024Updated last year
- Issues repository for linuxppc☆14Jun 16, 2024Updated last year
- ☆13Oct 22, 2023Updated 2 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- please use https://github.com/fireeye/vivisect instead☆16Oct 21, 2025Updated 4 months ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- 脚本☆14Dec 9, 2021Updated 4 years ago
- Python module to program Cypress FX EZ-USB series chipsets☆17Sep 1, 2017Updated 8 years ago
- hardening-check from debian checks binarys for Pie (Position Independent Executeable), Stack protection, fortify source and immediate bin…☆12Sep 12, 2016Updated 9 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- ☆14Oct 18, 2024Updated last year
- Easy way to automate the complex task☆15Jul 15, 2022Updated 3 years ago
- Complex state machine build in QNX real-time operating system. This state machine demonstrates multi-threading, namespaces, timers, and I…☆12Apr 9, 2019Updated 6 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆15Jan 29, 2025Updated last year
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- Rogue wifi AP with fake captive portal login page for pentesting with ESP32.☆12Jan 8, 2024Updated 2 years ago
- ☆14May 14, 2024Updated last year
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- Modified version of Duckuino to convert Ducky Script for use with Devices running ESPloit(Cactus WHID)☆13Oct 11, 2017Updated 8 years ago
- This tool helps you remove ghost followers to boost your instagram engagement!☆17Sep 13, 2023Updated 2 years ago
- Cross-browser fingerprinting library that generates fingerprint of a device. It is written in JavaScript.☆13Mar 13, 2019Updated 6 years ago
- Example code to use DRM KMS mode with dumbbuffer☆15Oct 8, 2014Updated 11 years ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆13May 22, 2025Updated 9 months ago