Notes and things regarding hacking DEFCON 26's badge
☆28Sep 18, 2018Updated 7 years ago
Alternatives and similar repositories for defcon26_badgehacking
Users that are interested in defcon26_badgehacking are comparing it to the libraries listed below
Sorting:
- Badge to badge communication bus for interoperability between various badge makers.☆29May 7, 2018Updated 7 years ago
- DefCon 26 Badge Hacking☆38Aug 16, 2018Updated 7 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- DCZia Defcon27 Laser Theremin Synthesizer Badge - 2019☆11Aug 9, 2019Updated 6 years ago
- Defcon 27 "DaBomb!" badge.☆30Aug 12, 2019Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Nov 21, 2020Updated 5 years ago
- defcon 27 badge☆25Aug 8, 2019Updated 6 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- ☆13Feb 5, 2026Updated last month
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Free e-books, built from markdown☆11Jul 15, 2024Updated last year
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Exploit code for CVE-2018-9411 for MediaCasService☆52Oct 30, 2018Updated 7 years ago
- ☆11Apr 27, 2020Updated 5 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Source code of generator of my (new) blog☆12Nov 10, 2024Updated last year
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- Unleash your FlexRadio. Connect directly to Wavelog without complex CAT middleware. Visualize enriched DX spots on your Panadapter, sync …☆13Feb 25, 2026Updated last week
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Encrypt and Decrypt message using Ethereum keys.☆12Mar 6, 2020Updated 6 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 7 months ago
- Simple demo ilustrating the use of LSTM neural network to predict daily changes in the Ethereum cryptocurrency☆10Jan 23, 2018Updated 8 years ago
- CodeMash 2023 - resources for Automating Almost All Application Security Things with CI/CD -- Even Honeypots!☆13Jan 12, 2023Updated 3 years ago
- 👾 quantum tensorflow machine learning deployment on k8s☆13Nov 10, 2024Updated last year
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- Aura client☆12Feb 2, 2017Updated 9 years ago