wrongbaud / wrongbaud.github.ioLinks
A blog describing general hardware and software reverse engineering.
☆18Updated 2 years ago
Alternatives and similar repositories for wrongbaud.github.io
Users that are interested in wrongbaud.github.io are comparing it to the libraries listed below
Sorting:
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- ☆25Updated 10 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆87Updated last year
- Practical Hardware Pentesting, published by Packt☆79Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- Advanced: Bluetooth low energy capture the flag☆65Updated 2 years ago
- ☆72Updated 5 months ago
- ☆11Updated 3 years ago
- Companion notebooks to the Hardware Hacking Handbook☆84Updated 4 years ago
- A vehicle network analysis and attack tool.☆117Updated 4 years ago
- Hardware Hacking Cheatsheet infograph☆157Updated last year
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆26Updated last year
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆29Updated 4 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Updated last year
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆69Updated last week
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- USB testing framework☆14Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆41Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 5 years ago
- Force target victim to unsafe network☆30Updated 8 months ago
- ☆28Updated this week
- Reverse engineering the TI AM3358 boot ROM☆60Updated last year
- A framework for creating smart cards (ICC-based cards with contacts).☆135Updated last year
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆17Updated 4 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- Bluetooth Security Assessment Methodology☆147Updated last month
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Updated 3 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆65Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago