Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Handheld LCD games emulator in Python with PyQt6
danielcuthbert / Glitchy
Forked from BitBangingBytes/GlitchyGlitchy is a no-code visual interface to the world of microcontroller glitching.
This repo houses Rubber Ducky scripts integrated with OpenAI's GPT. Designed for ethical hackers and researchers, it merges quick Ducky executions with GPT's intelligence. Always use responsibly an…
A proxy for USB devices, libUSB and gadgetFS - this project is unmaintained, try here: https://github.com/usb-tools/Facedancer
Spying on Microcontrollers using Current Sensing and embedded TinyML models
Some Useful Tricks for Pentest Android and iOS Apps
Repository for my flipper zero badUSB payloads. Now almost entirely plug and play.
USB Army Knife – the ultimate close access tool for penetration testers and red teamers.
Create your own AirTag with OpenHaystack, but without the need to own an Apple device
Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
Evil-M5Project is an innovative tool developed for ethical testing and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with Wi…
A simple scrolling text display library for the M5StickC
code to be able to use multiple esp32 to simulatnaiously scan for wifi networks across multiple other esp32
NFC MiTM made with two PN532 readers and a Raspberry Pi.
Lilygo T-Embed, CC1101 backpack, rtl_433_esp + OOK
OWASP IoT Top 10 2018 Mapping Project
OWASP IoT Security Verification Standard (ISVS)
My Notes about Penetration Testing
Disposable email inbox powered by serverless mailgun kittens
🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, ARM64 (Raspberry Pi, Apple Silicon), and RISC-V architectures …
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with co…