pdxbadgers / 2020-mask
talking LED mask for BSides 2020 presenters
☆22Updated 4 years ago
Alternatives and similar repositories for 2020-mask:
Users that are interested in 2020-mask are comparing it to the libraries listed below
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Learning about disassembling☆20Updated 5 years ago
- ☆46Updated 5 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆13Updated 4 years ago
- Red Team Resources☆59Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20☆60Updated 3 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆28Updated 5 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Updated 3 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Crash Royale Attack Kit☆40Updated 6 years ago
- ☆13Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Updated 4 years ago
- BLEMystique is an ESP32 based custom BLE target☆15Updated 6 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago