Repository for our paper Wearable Microphone Jamming
☆870Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for wearable-microphone-jamming
Users that are interested in wearable-microphone-jamming are comparing it to the libraries listed below
Sorting:
- ☆62Mar 6, 2021Updated 5 years ago
- Schematic for an ultrasonic jammer that produces noise at 20kHz, around the range of the iPhone MEMS microphone. It's a way to non-invasi…☆18Aug 19, 2020Updated 5 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- Removing people from complex backgrounds in real time using TensorFlow.js in the web browser☆5,164Oct 6, 2021Updated 4 years ago
- ☆12Sep 26, 2016Updated 9 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,264Dec 19, 2025Updated 2 months ago
- ☆13Jul 9, 2017Updated 8 years ago
- Tool that makes using AirDrop on Linux *easy*☆13Oct 14, 2021Updated 4 years ago
- IR Remote Control to USB HID Converter☆20Sep 15, 2024Updated last year
- Wireless Codec2 compressed audio transport over ESPNow using ESP32 micro controller.☆13Mar 29, 2025Updated 11 months ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server without crashing the NTP daemon☆23Mar 26, 2017Updated 8 years ago
- A huge list of alternatives to Google products. Privacy tips, tricks, and links.☆8,517Nov 8, 2025Updated 4 months ago
- (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.☆8,985Aug 23, 2025Updated 6 months ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆844Jan 11, 2021Updated 5 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,716Jan 16, 2024Updated 2 years ago
- HUB repository for all the Catsniffer Firmware code available maintaned by Electronic Cats☆36Mar 6, 2026Updated last week
- a processing sketch for exploring chaotic structures inherent in feedback systems☆16Jul 7, 2018Updated 7 years ago
- This repository contains Python code developed as part of my master thesis research on jamming techniques for drone communication systems…☆17Dec 7, 2024Updated last year
- Extrinsic noise is everywhere. Using a microphone and a Voltage controlled crystall oscillator, an RF circuit was built to jam cellular c…☆16May 5, 2019Updated 6 years ago
- This is a schematic for a cell phone jammer that works for the frequency band GSM 1900. It was part of my master's thesis at ITP/NYU. See…☆48Oct 21, 2014Updated 11 years ago
- Compilation of HID Scripts and Payloads for P4wnP1☆27Sep 11, 2022Updated 3 years ago
- cheap and terrible voltage glitcher hardware/software☆42Jan 1, 2020Updated 6 years ago
- 🎤⌨️ Acoustic keyboard eavesdropping☆8,974Jan 15, 2023Updated 3 years ago
- The "Split-Pic" functionality, as used on Clickhole☆12Feb 10, 2019Updated 7 years ago
- Open-source, full metal 6WD robot☆18Nov 23, 2018Updated 7 years ago
- Receive/Transmit/Save Evil Crow RF log files 📡☆15Jul 7, 2023Updated 2 years ago
- ESP32 + NRF24L01 2.4 GHz noise generator, designed to jam Bluetooth☆16Jan 28, 2023Updated 3 years ago
- A DIY 60W PD Powerbank with realtime battery display for charging your laptop and smartphone☆21Mar 24, 2022Updated 3 years ago
- Computer Vision Basics in Microsoft Excel (using just formulas)☆2,422Oct 21, 2023Updated 2 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,096Jul 3, 2022Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,320Jul 27, 2021Updated 4 years ago
- Audio and video casting system with support for custom applications.☆2,543Jan 10, 2026Updated 2 months ago
- GPS Spoofer Catcher, the GPS IDS.☆91Mar 26, 2017Updated 8 years ago
- Satellite imagery for dummies.☆1,834Mar 12, 2022Updated 4 years ago
- P2P Electron updater with binary diffing built in☆19Dec 21, 2020Updated 5 years ago
- Affordable WiFi hacking platform for testing and learning☆14,652Aug 14, 2024Updated last year
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆59,512Updated this week
- Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)☆817Sep 8, 2019Updated 6 years ago