m0n73 / dc26_BadgeEmulatorView external linksLinks
This code was used with Arduino Nano to create the OG defcon 26 badge emulator.
☆56Feb 13, 2020Updated 6 years ago
Alternatives and similar repositories for dc26_BadgeEmulator
Users that are interested in dc26_BadgeEmulator are comparing it to the libraries listed below
Sorting:
- Badge to badge communication bus for interoperability between various badge makers.☆29May 7, 2018Updated 7 years ago
- Notes and things regarding hacking DEFCON 26's badge☆28Sep 18, 2018Updated 7 years ago
- defcon 27 badge☆25Aug 8, 2019Updated 6 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- meshtastic meshbot☆15Jul 29, 2024Updated last year
- KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.☆10Jul 11, 2017Updated 8 years ago
- This repository will be containing all kind of additional resources that I think might be useful for someone fuzzing document (pdf, doc, …☆15Mar 22, 2020Updated 5 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- ☆19Sep 2, 2018Updated 7 years ago
- A collection of some Powershell scripts and functions for building lab-environments☆19Feb 25, 2023Updated 2 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated last year
- New and Improved☆17May 7, 2016Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- The generates a report for SSIDs, exports to PDF and CSV☆22Oct 2, 2021Updated 4 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 6 months ago
- ☆19Jul 7, 2021Updated 4 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Code to sniff and send 433Mhz RF signals to outlets and bulb sockets☆24Dec 19, 2020Updated 5 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- ☆24Apr 10, 2024Updated last year
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago