svbl / picomradeLinks
This repository contains a step-by-step guide and sample configs how to turn a Raspberry Pi Zero-W into a portable companion device. Build you own piComrade today! :-)
☆125Updated 7 years ago
Alternatives and similar repositories for picomrade
Users that are interested in picomrade are comparing it to the libraries listed below
Sorting:
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Cleans out "open" wireless connections from OSX machine☆154Updated 5 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆254Updated 3 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Transparent network tap☆120Updated 10 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 4 months ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Linux file read monitor☆90Updated 2 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Bash script to install Honeypot projects ona Raspbian System☆28Updated 10 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Wiegotcha: Long Range RFID Thief☆235Updated 4 years ago
- ☆84Updated 7 years ago
- Wristband research tools☆31Updated 9 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆100Updated 6 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- Web Sight Docker Deployment☆122Updated 8 years ago
- Local Privilege Escalation☆209Updated 8 years ago
- CERT Tapioca for MITM network analysis☆184Updated last year
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Stargate☆95Updated 9 years ago
- food food food☆239Updated last month