netik / dc25_spqr_badge
KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.
☆10Updated 7 years ago
Alternatives and similar repositories for dc25_spqr_badge:
Users that are interested in dc25_spqr_badge are comparing it to the libraries listed below
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Purposely Vulnerable Embedded Device☆22Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- RHme+ 2015 challenge☆111Updated 8 years ago
- AND!XOR DEFCON 24 Badge HW and SW☆44Updated 4 years ago
- The 2017 Crypto and Privacy Village Badge☆31Updated 4 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- POLAR☆73Updated 6 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 6 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- Utility to decompress Linux swsusp hibernation file.☆27Updated 3 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- ☆28Updated 4 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆86Updated 7 years ago
- A GUI-based USB device fuzzer☆62Updated 7 years ago
- DefCon 26 Badge Hacking☆38Updated 6 years ago
- NCC Group Open Source RF Security Testing Methodology☆91Updated 2 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- EM4100 RFID Cloner Kit☆63Updated last year
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆72Updated 6 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆158Updated 7 years ago