Code used to control a hacked toy robot to with my brainwaves.
☆43Dec 15, 2018Updated 7 years ago
Alternatives and similar repositories for mind-controlled-robot
Users that are interested in mind-controlled-robot are comparing it to the libraries listed below
Sorting:
- R package to read EDF(+) and BDF(+) files☆11Mar 20, 2019Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Scripts to read data out of the Neurosky Mindwave Mobile unter Ubuntu☆21Feb 22, 2013Updated 13 years ago
- Hack accounts and passwords on Asterisk servers☆17Mar 16, 2015Updated 10 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- A better command line clipboard☆28Jan 20, 2023Updated 3 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- A reader-writer lock that can be used with a Condvar.☆29Jun 2, 2016Updated 9 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Read and save MSFS aircraft state and apply to next flight☆10Nov 11, 2025Updated 3 months ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- My personal profile!☆17Oct 25, 2024Updated last year
- An extensible component for detecting cosmetic contact lenses in iris imagery.☆10Jun 25, 2025Updated 8 months ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- R.I.P Mashov System (Telegram Bots system) - PHP☆10Jul 25, 2020Updated 5 years ago
- bot and proxy for Minecraft☆24May 7, 2013Updated 12 years ago
- Calendari elettronici per la raccolta rifiuti di Chieri e comuni limitrofi☆12Feb 24, 2026Updated last week
- The Linux Routing Agent for hyperglass☆13Feb 28, 2021Updated 5 years ago
- Makes it easy to convert Python data structures to JSON strings suitable for flot series and options☆25Sep 26, 2012Updated 13 years ago
- ☆10Apr 9, 2020Updated 5 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- ☆12Jun 1, 2024Updated last year
- Primarily aimed at replicating files that cannot be directly copied due to being in use.☆11Apr 22, 2024Updated last year
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Various Arduino project codes made available by me.☆10Sep 30, 2016Updated 9 years ago
- Eczane/ilaç hırsızlığının, nakliye sırasında sıcaklık sapmalarının kaçınılmaz olduğu merkezi veritabanı sistemlerini çözmeye adanmış basi…☆10May 20, 2022Updated 3 years ago
- Perintah : $pkg update && pkg upgrade $pkg install python2 $pkg install git $git clone https://github.com/spider-fb/spider-fb $pip2 …☆10Jul 10, 2020Updated 5 years ago