securelyfitz / JarOfFirefliesLinks
ATtiny-based Jar of Fireflies soldering project
☆11Updated 9 years ago
Alternatives and similar repositories for JarOfFireflies
Users that are interested in JarOfFireflies are comparing it to the libraries listed below
Sorting:
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆44Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- ☆12Updated 8 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- ☆31Updated 5 years ago
- Public resources NB shares☆18Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago