svbl / picomrade
This repository contains a step-by-step guide and sample configs how to turn a Raspberry Pi Zero-W into a portable companion device. Build you own piComrade today! :-)
☆125Updated 7 years ago
Alternatives and similar repositories for picomrade:
Users that are interested in picomrade are comparing it to the libraries listed below
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- Linux file read monitor☆89Updated last year
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- ☆82Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆238Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Stargate☆94Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- Transparent network tap☆116Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆152Updated 4 years ago
- ☆155Updated 7 years ago
- A Github organization reconnaissance tool.☆218Updated last year
- Auto discover and exploit LAN raspberry pi's☆106Updated last year
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- ☆38Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago