pdxbadgers / 2020-mask
talking LED mask for BSides 2020 presenters
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for 2020-mask
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 7 months ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- ☆46Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Learning about disassembling☆20Updated 5 years ago
- Public specifications for easy accessibility☆19Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Get clients and access points.☆49Updated 5 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆61Updated 3 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆44Updated 5 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆12Updated 3 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Updated 4 years ago
- Crash Royale Attack Kit☆40Updated 5 years ago
- My public exploit collection.☆31Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- A repository of CAD files for 3D printable optical components.☆18Updated 6 years ago
- Voltage glitcher to bypass instructions/bootloader protections without target modification☆15Updated 4 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 4 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆32Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- ☆29Updated 4 years ago