Quiet - Private messaging. No servers.
Hack
ipfs/ipfs-desktop: An unobtrusive and user-friendly desktop application for IPFS on Windows, Mac and Linux.
An unobtrusive and user-friendly desktop application for IPFS on Windows, Mac and Linux. - GitHub - ipfs/ipfs-desktop: An unobtrusive and user-friendly desktop application for IPFS on Windows, Mac...
johnlodan/blind-rce: A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract the data that is not visible and/or not returned in the response of vulnerable target. It uses time-based techniques by sending a payload to the target with a command specified and then waiting for its response.
A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract the data that is not visible and/or not returned in the response of vulnera...
SAO Lora Walkie Talkie (no radio) by Endless Projects on Tindie
An adapter that accepts a Reyax RYLR998 Transceiver to easily enable wireless serial communication from an SAO using the GPIO pins.
RF Spectrum Analyzer using USB dongle by H-Instruments on Tindie
Probably the cheapest RF spectrum Analyzer on the market
USB Tuner Receiver 100KHz-1.7GHz Full Band UV HF by Maker go on Tindie
100 KHZ to 1.7 GHz all band radio RTL - SDR receiver RTL2832 + R820T RTL-SDR
Business Shop | Where to buy the best IoT and M2M SIM card
Purchase an extraordinary IoT SIM card! Build your IoT or M2M solution anytime, anywhere in over 165 countries.
Home Page
Independent Security Boutique Prototyping Offensive & Opensource Hardware Implants for conducting HID & Mousjeack Attacks and Bypass AirGapped Environments since March 2017... and other cool stuff related to IIoT, Physical Security, Radio Hacking, etc.
Artemis
Discover Artemis, the cutting-edge software for real-time RF signal identification and storage. Utilize an extensive database of nearly 500 recognized signals to analyze, collect, and manage RF data with precision. Store spectrum waterfalls, audio samples, and various documents effortlessly for future reference.
Signal Identification Wiki
This wiki is intended to help identify radio signals through example sounds and waterfall images. Most signals are received and recorded using a software defined radio such as the RTL-SDR, Airspy, SDRPlay, HackRF, BladeRF, Funcube Dongle, USRP and other devices.
bluefluff/doc/generalplus.md at master · Jeija/bluefluff commands
Reverse Engineering Furby Connect's Bluetooth Protocol and Update Format - Jeija/bluefluff
bluefluff/doc/actionlist.md at master · Jeija/bluefluff
Reverse Engineering Furby Connect's Bluetooth Protocol and Update Format - Jeija/bluefluff
Rek2 httpserver
mitmproxy - an interactive HTTPS proxy
Jeija/bluefluff: Reverse Engineering Furby Connect's Bluetooth Protocol and Update Format
Reverse Engineering Furby Connect's Bluetooth Protocol and Update Format - Jeija/bluefluff
Flood Gateway
https://github.com/hak5/sharkjack-payloads/blob/master/payloads/library/execution/FloodGateway/payload.sh
USB Poison
https://github.com/hak5/usbrubberducky-payloads/blob/master/payloads/library/general/USB-Poison/USB-Poison.txt
ESP RFID Tool - Hacker Warehouse
ESP RFID Tool is a WiFi enabled tap for the Wiegand protocol, which is the most widespread protocol for proximity card reader systems. ESP RFID Tool can be installed in a reader to passively sniff and log Wiegand data. The main target group for this device is 26-37bit HID cards. For known card types both [...]
lixmk/Wiegotcha: Wiegotcha: Long Range RFID Thief
Wiegotcha: Long Range RFID Thief. Contribute to lixmk/Wiegotcha development by creating an account on GitHub.
nfc-tools/mfoc: Mifare Classic Offline Cracker
Mifare Classic Offline Cracker. Contribute to nfc-tools/mfoc development by creating an account on GitHub.
mfcuk | Kali Linux Tools
nfc-tools/mfcuk: MiFare Classic Universal toolKit (MFCUK)
MiFare Classic Universal toolKit (MFCUK). Contribute to nfc-tools/mfcuk development by creating an account on GitHub.
RFID Security Testing - PenTesting.Org
RFID security testing helps organizations identify and fix vulnerabilities in their radio frequency identification systems before attackers can exploi
ESP RFID Tool
Introduction The ESP RFID Tool is an RFID implant tool, designed to wirelessly log, exfiltrate and inject data directly off the wires of access control readers. When a badge is scanned, the Access Control Reader decodes the information in the card, and communicates this data over a wired connection to the authenticatio
Blog
Get up-to-date hot takes on the state of cybersecurity today, from responses to US-CERT alerts, to using the MITRE ATT&CK framework.
CPR - Check Point Research
Check Point Research, the Intelligence and research arm of Check Point Technologies provides leading cyber threat intelligence to Check Point customers and the greater intelligence community.
Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack'
Russian state hackers APT28 (Fancy Bear/Forest Blizzard/Sofacy) breached a U.S. company through its enterprise WiFi network while being thousands of miles away, by leveraging a novel technique called "nearest neighbor attack."
Vx Underground - APT News 2024
The largest collection of malware source code, samples, and papers on the internet.
Ransomware.live 👀 Cyberattack news
Ransomware.live tracks & monitors ransomware groups' victims and their activity. It was created by Julien Mousqueton, a security researcher. The website provides information on Ransomware groups, victims, negotiations, and payment demands. It also includes the latest cyberattacks.
Krebs on Security kiberphant0m arrested, linked to china's telecom hacks?
In-depth security news and investigation