lblopes / unixprogrammingLinks
Some C templates/examples for UNIX programming
☆12Updated last year
Alternatives and similar repositories for unixprogramming
Users that are interested in unixprogramming are comparing it to the libraries listed below
Sorting:
- Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)☆13Updated 4 years ago
 - Web Vulnerability Assessment Tool☆10Updated 3 years ago
 - code and manual for the defcon 29 electronic Tor badge☆24Updated 3 years ago
 - Learn car hacking with Python and BeagleBone Blue☆39Updated 2 years ago
 - pyAirwaves is an ADS-B and AIS processing, storage (planned), and display application with Leaflets integration.☆11Updated 2 years ago
 - Damn Vulnerable IoT Device☆212Updated last year
 - Multipurpose Breakout for the FT232H☆94Updated last year
 - Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
 - Team Page☆15Updated 6 years ago
 - 📆 Sigarra Tools | An extension that makes the information system of the University of Porto slightly better.☆37Updated 2 years ago
 - This will be a wiki when it grows up, if it grows up☆95Updated 2 months ago
 - Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
 - 🐝 Zigbee security research toolkit for the RaspBee, nRF52840 and CC2531 radio modules.☆30Updated 5 years ago
 - This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or …☆181Updated 2 years ago
 - Open source PCB the size of a credit card that is capable of detecting the field generated by a RFID reader and identify if it is a LF(12…☆75Updated 7 years ago
 - A tool for recovering credentials from sniffed PPPoE, RADIUS and L2TPv2 CHAP authentications☆18Updated 9 years ago
 - writeups for Capture The Flag Competitions☆16Updated 3 years ago
 - ☆30Updated 4 years ago
 - A simple Python 3 script to perform Common Modulus attacks on RSA☆40Updated 5 years ago
 - Voltage glitcher to bypass instructions/bootloader protections *without* target modification☆132Updated 5 years ago
 - Companion notebooks to the Hardware Hacking Handbook☆80Updated 4 years ago
 - A Wi-Fi hacking game for CTF's and hackerspaces to teach cracking WPA/WAP2 - Who will be the Chicken Man?☆179Updated 4 years ago
 - Reference page to my DEF CON 28 presentation.☆17Updated 5 years ago
 - Notes for the Cryptography course at Sapienza☆11Updated 5 years ago
 - Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆51Updated last week
 - Convert rubber ducky scripts to arduino compatible code☆32Updated 8 years ago
 - A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,251Updated 10 months ago
 - Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆63Updated 3 years ago
 - PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆321Updated last year
 - RFQuack: the versatile RF-analysis tool that quacks!☆95Updated 3 years ago