m0n73 / dc26_BadgeEmulatorLinks
This code was used with Arduino Nano to create the OG defcon 26 badge emulator.
☆56Updated 5 years ago
Alternatives and similar repositories for dc26_BadgeEmulator
Users that are interested in dc26_BadgeEmulator are comparing it to the libraries listed below
Sorting:
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Badge to badge communication bus for interoperability between various badge makers.☆29Updated 7 years ago
- Notes and things regarding hacking DEFCON 26's badge☆27Updated 6 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- How I hacked mine..☆20Updated 5 years ago
- Stargate☆94Updated 8 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆11Updated 5 years ago
- defcon 27 badge☆25Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A small script to automate project folder management and basic tool output☆35Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Web Sight Docker Deployment☆123Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 2 months ago
- Collection of metasploit modules☆68Updated 8 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- DefCon 26 Badge Hacking☆38Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.☆10Updated 7 years ago
- #CyberBarcode☆66Updated last year
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆160Updated 2 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year