yownas / firefly
Remote shell/exfiltration using keyboard leds.
☆26Updated 7 years ago
Alternatives and similar repositories for firefly:
Users that are interested in firefly are comparing it to the libraries listed below
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- Scan for signal peaks with RTL-SDR☆33Updated 11 years ago
- Code etc for the badge creation and payloads☆11Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- Hacker Warehouse electronic badge that was made for DEF CON 25☆17Updated 7 years ago
- ANWI - All New Wireless IDS☆27Updated 6 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆43Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆27Updated 8 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Reverse engineering a vintage wireless keypad☆14Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- ☆18Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago