occupywifi / firmwareLinks
Occupy WiFi Firmware
☆11Updated 10 years ago
Alternatives and similar repositories for firmware
Users that are interested in firmware are comparing it to the libraries listed below
Sorting:
- Agent part of Hashtopus☆17Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago
- An attempt to streamline the Android hardening process from the Tor Blog.☆48Updated 9 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆18Updated 11 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- SilverEdge Inc. SilverPush Demo Apps (unmasked)☆85Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆84Updated 7 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- UPC router default WPA2 key generator☆31Updated 9 years ago
- ☆12Updated 8 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- ☆30Updated 10 years ago
- DefCon Hardware Hacking Village Learn To Solder Kit☆40Updated 10 years ago
- Password analysis software☆37Updated 10 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 10 years ago
- convert OTR keystores into other keystore formats for moving keys into a new IM app☆85Updated 10 years ago
- Cable modem firmware dump☆41Updated 10 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆63Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- Z-Wave Packet Interception and Injection Tool☆35Updated 9 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆57Updated 7 years ago
- ☆25Updated 8 years ago
- Research into potential vulnerabilities and risks of auto-generated pseudorandom passwords + Bluetooth Exploit.☆22Updated 6 years ago
- Public File Sharing Network for Demonsaw☆17Updated 8 years ago
- WAyereless Site SUrveying Program☆12Updated 9 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago