securelyfitz / JarOfFirefliesLinks
ATtiny-based Jar of Fireflies soldering project
☆11Updated 9 years ago
Alternatives and similar repositories for JarOfFireflies
Users that are interested in JarOfFireflies are comparing it to the libraries listed below
Sorting:
- stuff from my ToorCon 2015 talk☆15Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- ☆31Updated 5 years ago
- USB key cleaner☆62Updated 8 years ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- ☆12Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 10 years ago
- ☆18Updated 9 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆44Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 10 years ago