seeess / AI-6th-Finger-RingLinks
Wear a 6th finger to make surveillance footage look like it's AI generated
☆38Updated last year
Alternatives and similar repositories for AI-6th-Finger-Ring
Users that are interested in AI-6th-Finger-Ring are comparing it to the libraries listed below
Sorting:
- Scans for BLE devices and if it see any from Taser International sets an home assistant switch to 'on', turns back off a minute after the…☆137Updated last year
 - ☆35Updated 7 months ago
 - uses the atom gps kit to wardrive and give status via the leds☆27Updated last year
 - The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆155Updated last month
 - RF-modulated high fidelity laser microphone and keystroke sniffer☆77Updated last year
 - The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆81Updated last year
 - Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆50Updated 2 years ago
 - Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
 - Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
 - code and manual for the defcon 29 electronic Tor badge☆24Updated 3 years ago
 - Drive-by data exfiltration using open WiFi networks & DNS requests☆157Updated last year
 - An Open-Source Door Simulator for RFID/PACS Training☆136Updated 11 months ago
 - A cheaper and open-hardware version of the blasoned Sensepeek's PCBite for Hardware Hacking and DIY Hobbyists☆98Updated 5 months ago
 - unified firmware links for oui-spy board☆40Updated last week
 - A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆147Updated 2 years ago
 - Distributed Signal Intelligence Platform☆150Updated this week
 - ☆174Updated last month
 - nard a dual sim/sam card interface for the flipper zero☆87Updated 11 months ago
 - Files for HackRF + Portapack MAYHEM firmware to open any and all Tesla vehicle charging ports in range!☆184Updated 3 years ago
 - A simple CUDA accelerated bruteforcer for KeeLoq algorithm☆41Updated 2 years ago
 - Design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord☆40Updated 8 months ago
 - VStarcam P2P Decryption Utility☆46Updated last year
 - RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 9 months ago
 - ☆149Updated last year
 - Wiegand data logger, replay device and micro door-controller☆14Updated last year
 - Signal Tracking & Detection☆15Updated this week
 - ☆19Updated 2 months ago
 - Hardware and software for a man-in-the-middle DNS cache poisoning attack on an Ethernet network☆38Updated last year
 - MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.☆108Updated 7 months ago
 - OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago