securelyfitz / JarOfFirefliesLinks
ATtiny-based Jar of Fireflies soldering project
☆11Updated 9 years ago
Alternatives and similar repositories for JarOfFireflies
Users that are interested in JarOfFireflies are comparing it to the libraries listed below
Sorting:
- stuff from my ToorCon 2015 talk☆15Updated 10 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- Hacker Warehouse electronic badge that was made for DEF CON 25☆17Updated 8 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- Canari local transforms pcap file analysis☆31Updated 11 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- ☆12Updated 9 years ago
- ☆18Updated 9 years ago
- Scan for signal peaks with RTL-SDR☆34Updated 12 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆33Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- CDDC Exploitation Framework☆13Updated 2 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- ☆17Updated 10 years ago