netik / dc25_spqr_badgeLinks
KiCad files and all component files to manufacture the IDES OF DEF CON Badge, an Unofficial Electronic Badge.
☆10Updated 8 years ago
Alternatives and similar repositories for dc25_spqr_badge
Users that are interested in dc25_spqr_badge are comparing it to the libraries listed below
Sorting:
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- DEF CON 25 Hardware Hacking Village Reverse Engineering Challenge☆17Updated 7 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Miscellaneous Tools☆38Updated 10 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- scripts and examples for using JTAG debug tools to gain root access☆180Updated 9 years ago
- RHme+ 2015 challenge☆115Updated 9 years ago
- The USB host security assessment tool☆285Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- DefCon 26 Badge Hacking☆38Updated 7 years ago
- ☆24Updated 10 years ago
- Notes and things regarding hacking DEFCON 26's badge☆27Updated 7 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆54Updated 9 years ago
- ☆106Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- A simple ISO7816 analyzer that only requires the data-stream.☆61Updated 7 years ago
- POLAR☆74Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 8 years ago