tetreum / wearedata
Reverse engineering Watch Dogs We Are Data map
☆15Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for wearedata
- Project details, downloads and supported device list for OpenRazer☆11Updated this week
- A library which makes modification of browsers' behavior easy.☆10Updated 3 years ago
- Repository for Tor's DNS-related issues.☆17Updated 7 years ago
- a pocket-sized, teensy-based HID emulator used to exploit the targeted computer's trust of USB keyboards and mice.☆8Updated 8 years ago
- executing JS from x86 code☆28Updated 5 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆9Updated 5 years ago
- Various tools written or modified by me☆9Updated this week
- Pcap javascript parser☆12Updated 6 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Updated 8 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- 802.11 radiotap and MPDU parser☆14Updated 6 years ago
- Ultimaker 2/2+ firmware with extruder fan control + interposer board☆10Updated 4 years ago
- Linux Code Injection Toolkit - Code interposition for Linux☆17Updated 13 years ago
- ☆17Updated 10 years ago
- FEZ .pak file extractor☆11Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆13Updated 7 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 7 months ago
- Osmocom SS7 stack, with Shadytel modifications.☆17Updated 12 years ago
- Simplified version of flashrom for installing new system firmware☆18Updated last year
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 9 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Man-in-the-middle against Tor bridges☆25Updated 4 years ago
- eda-3 from many years ago☆14Updated 10 years ago
- tamper resistant audit log☆18Updated 6 years ago
- A small script for listing and exporting WhatsApp chats☆12Updated 4 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 10 years ago