zakqwy / NSA-B-GONE
Thinkpad X220 board that disconnects the webcam and microphone data lines
☆43Updated 5 years ago
Alternatives and similar repositories for NSA-B-GONE:
Users that are interested in NSA-B-GONE are comparing it to the libraries listed below
- Small EFI utility that clears the power-on and setup passwords in IBM x3550/x3650 M3 servers☆46Updated 4 years ago
- ☆34Updated 6 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Web of trust grapher☆39Updated 10 months ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- ☆44Updated this week
- A USB armory based USB sandbox☆20Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Password manager for USB Armory☆37Updated 9 years ago
- A collection of crackmes☆40Updated 3 weeks ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆20Updated 4 months ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- An Arduino USB plugin that attempts to guess the host OS☆78Updated 6 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆48Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Updated 4 years ago
- ☆15Updated 8 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 4 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- SAVIORBURST☆21Updated 9 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago