marcnewlin / led-top-hat
Top hat with 1024 addressable LEDs and glitter felt.
☆26Updated 7 years ago
Alternatives and similar repositories for led-top-hat:
Users that are interested in led-top-hat are comparing it to the libraries listed below
- ☆13Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆22Updated 7 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆43Updated 9 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 7 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago
- Small and cheap standalone USB sanitizer☆42Updated 3 years ago
- This package allows reading and writing bettercap's session recordings.☆15Updated 5 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago
- SAO/Badge for Tor at Defcon 27☆21Updated 5 years ago
- ☆30Updated 9 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆40Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆37Updated 7 years ago
- All related files and slides for past talks☆44Updated last year
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 8 years ago