seeess / Defcon-Tor-27Links
SAO/Badge for Tor at Defcon 27
☆21Updated 6 years ago
Alternatives and similar repositories for Defcon-Tor-27
Users that are interested in Defcon-Tor-27 are comparing it to the libraries listed below
Sorting:
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- An experimental file formats playground☆87Updated 2 years ago
- USB key cleaner☆62Updated 7 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 4 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 7 months ago
- Top hat with 1024 addressable LEDs and glitter felt.☆26Updated 8 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Updated 4 years ago
- USB armory - boot loader☆36Updated last month
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- FluxN0de☆15Updated 3 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- USB armory - hardware control tool☆32Updated last month
- USB armory Debian base image☆82Updated 3 weeks ago
- A wireshark dissector for Mode-S aircraft transmissions☆14Updated 9 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆57Updated 7 years ago
- Hide secret information in typographical errors☆32Updated 9 years ago
- Cooperative RSA signing☆26Updated 5 years ago
- Open Sim Kit (OSK) is FOSS software for editing the content and functions of SIM cards.☆31Updated 12 years ago
- Password manager for USB Armory☆37Updated 10 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Good-enough Hex Editor/Annotator☆24Updated 5 years ago
- DIY FIDO2 U2F token☆42Updated 2 years ago
- Every document published from the Snowden archive☆70Updated 10 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwares☆50Updated 6 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- A (hopefully) unbiased timeline of events related to accusations against Jacob Appelbaum☆20Updated 8 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆78Updated 8 years ago