netik / dc25_spqr_badge
KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.
☆10Updated 7 years ago
Alternatives and similar repositories for dc25_spqr_badge:
Users that are interested in dc25_spqr_badge are comparing it to the libraries listed below
- AND!XOR DEFCON 24 Badge HW and SW☆43Updated 4 years ago
- Badge to badge communication bus for interoperability between various badge makers.☆29Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 3 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- EM4100 RFID Cloner Kit☆64Updated last year
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Timing Sidechannel workshop☆29Updated 11 years ago
- ☆18Updated 8 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆16Updated 6 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆28Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆35Updated 10 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆85Updated 7 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆11Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆43Updated 10 years ago
- DefCon 26 Badge Hacking☆38Updated 6 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Updated 4 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆115Updated 6 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- ☆27Updated 4 years ago
- New firmware for the DEFCON 24 badge☆8Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆48Updated 10 years ago