marcnewlin / led-top-hatLinks
Top hat with 1024 addressable LEDs and glitter felt.
☆26Updated 8 years ago
Alternatives and similar repositories for led-top-hat
Users that are interested in led-top-hat are comparing it to the libraries listed below
Sorting:
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 10 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Repo for the paper "USB Devices phoning home"☆22Updated 9 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- CableTap public disclosure documents.☆79Updated 8 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- An experimental file formats playground☆87Updated 2 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 6 months ago
- Miscellaneous Tools☆38Updated 10 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- ☆36Updated 9 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- Simple tool to graph files for quick analysis☆55Updated last year
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago