y-x-c / wearable-microphone-jammingLinks
Repository for our paper Wearable Microphone Jamming
☆857Updated 5 years ago
Alternatives and similar repositories for wearable-microphone-jamming
Users that are interested in wearable-microphone-jamming are comparing it to the libraries listed below
Sorting:
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆810Updated 6 years ago
- A (paused) work-in-progress long-range, low-bandwidth wireless disaster recovery mesh network powered by the sun.☆1,107Updated 2 years ago
- Off The Grid Messenger☆520Updated 4 years ago
- Etherify - bringing the ether back to ethernet☆347Updated 4 years ago
- A collection of tools for generating models of physical keys for 3D printing☆189Updated 6 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆837Updated 4 years ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆1,026Updated 2 years ago
- TESLA PowerWall 2 Security Shenanigans☆463Updated last year
- Wi-Fi Geolocation Spoofing with ESP8266 / ESP32☆459Updated last year
- A friendly browser-based tool for anonymizing photographs taken at protests☆976Updated 3 years ago
- Digispark ATtiny85 USB key "rubber ducky" clone☆225Updated 6 years ago
- DeepPrivacy: A Generative Adversarial Network for Face Anonymization☆1,302Updated last year
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- Winner of Mozilla's $50,000 prize for AI☆912Updated 2 years ago
- A pendant to warn you when you touch your face☆268Updated 5 years ago
- THE ESP8266 HONEYPOT☆318Updated 5 years ago
- Installing a RGB mechanical keypad on my microwave.☆495Updated 4 years ago
- 📡 An AX.25 packet radio chat protocol with support for digital signatures and binary compression. Like IRC over radio waves.☆772Updated 5 years ago
- An adblocker for live radio streams and podcasts. Machine learning meets Shazam.☆1,491Updated 4 years ago
- A repository to monitor attack vectors from state-backed information operations☆399Updated last year
- An implementation of TEMPEST en GNU Radio☆621Updated 7 months ago
- Files for low-cost hearing aid (LoCHAid) paper in PLOS ONE☆209Updated 3 years ago
- An attempt to be able to see wifi router locations.☆524Updated 4 years ago
- Replacement board for Casio Calculator Watches using the CC430F6147☆540Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,168Updated 3 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆606Updated 2 months ago
- ☆293Updated 4 years ago
- Forget the past. Social Amnesia makes sure your social media accounts only show your posts from recent history, not from "that phase" 5 y…☆805Updated last year
- Utilize a Raspberry Pi and a Nuand BladeRF to generate your own portable local cell network☆417Updated 6 years ago
- SecKC Challenge☆111Updated 7 years ago