Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.
☆30Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for flash-bash
Users that are interested in flash-bash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆15Sep 16, 2020Updated 5 years ago
- carrier board for using the seeduino xiao (or xiaorp2040, adfruit qt py, qt py 2040) for jtagulating and implanting☆30Dec 21, 2024Updated last year
- Python Tools for UART Hacking☆27Oct 15, 2020Updated 5 years ago
- SAVIORBURST☆22Nov 24, 2015Updated 10 years ago
- A MouseJack attack tool for the RF-Nano V3 board. Info: https://www.davidmgilbert.com/iot/drones-a-serious-security-threat/☆13Apr 16, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- NodeMCU ESP8266 CC1101 Sub1GHz OOK transmitter & brute forcer w/ pre-saved signals (e.g. TouchTunes Jukebox)☆17Jul 22, 2021Updated 4 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Sep 1, 2020Updated 5 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Tools for dumping a parallel flash chip via an ESP32 and MCP23017 ICs☆29Dec 5, 2019Updated 6 years ago
- AVR based ISM transciever covering 260-960MHz☆19Apr 11, 2012Updated 13 years ago
- ☆14Feb 4, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python simulation of "rolljam" attacks☆18Jul 29, 2022Updated 3 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- Read EMV cards with NFC☆16Apr 14, 2014Updated 11 years ago
- Receive/Transmit/Save Evil Crow RF log files 📡☆15Jul 7, 2023Updated 2 years ago
- Minimal UART client in Golang that dumps LPC1343 chips that are locked at CRP1.☆20Feb 27, 2021Updated 5 years ago
- 2nd Generation of Multipurpose FTDI-based board for Hardware Hacking and IoT Security Testing☆33Sep 22, 2023Updated 2 years ago
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆136Feb 9, 2026Updated 2 months ago
- A simple USB sniffer based on Raspberry PI PICO RP2040 (pico-sdk)☆46Nov 6, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python library to perform fault-injection attacks on microcontrollers☆165Updated this week
- Rolling Codes are used in cars to authenticate that you're the one who has the key and wants to open the car. But this can be broken pret…☆36Apr 8, 2021Updated 5 years ago
- ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware☆87Jun 1, 2014Updated 11 years ago
- The great opencd tool compiled for Windows with Bus Pirate support☆14Nov 24, 2017Updated 8 years ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆57Mar 4, 2026Updated last month
- ☆11Oct 13, 2019Updated 6 years ago
- Firmware Reversing Repo :p☆17Oct 11, 2015Updated 10 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Data Recovery Research☆13Dec 19, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆25Sep 4, 2017Updated 8 years ago
- Resources for Fault Injection☆62Mar 4, 2024Updated 2 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 3 months ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆12Aug 11, 2019Updated 6 years ago
- Reverse Engineering for Beginners (RE4B)☆33Dec 31, 2025Updated 3 months ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆18Apr 8, 2023Updated 3 years ago
- TLCS-90 ROM Reader☆15Nov 5, 2025Updated 5 months ago