ipfs/ipfs-desktop: An unobtrusive and user-friendly desktop application for IPFS on Windows, Mac and Linux.
An unobtrusive and user-friendly desktop application for IPFS on Windows, Mac and Linux. - GitHub - ipfs/ipfs-desktop: An unobtrusive and user-friendly desktop application for IPFS on Windows, Mac...
johnlodan/blind-rce: A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract the data that is not visible and/or not returned in the response of vulnerable target. It uses time-based techniques by sending a payload to the target with a command specified and then waiting for its response.
A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract the data that is not visible and/or not returned in the response of vulnera...
Independent Security Boutique Prototyping Offensive & Opensource Hardware Implants for conducting HID & Mousjeack Attacks and Bypass AirGapped Environments since March 2017... and other cool stuff related to IIoT, Physical Security, Radio Hacking, etc.
Discover Artemis, the cutting-edge software for real-time RF signal identification and storage. Utilize an extensive database of nearly 500 recognized signals to analyze, collect, and manage RF data with precision. Store spectrum waterfalls, audio samples, and various documents effortlessly for future reference.
This wiki is intended to help identify radio signals through example sounds and waterfall images. Most signals are received and recorded using a software defined radio such as the RTL-SDR, Airspy, SDRPlay, HackRF, BladeRF, Funcube Dongle, USRP and other devices.
sensepost/USaBUSe: Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.
Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost. - sensepost/USaBUSe
ESP RFID Tool is a WiFi enabled tap for the Wiegand protocol, which is the most widespread protocol for proximity card reader systems. ESP RFID Tool can be installed in a reader to passively sniff and log Wiegand data. The main target group for this device is 26-37bit HID cards. For known card types both [...]
Introduction The ESP RFID Tool is an RFID implant tool, designed to wirelessly log, exfiltrate and inject data directly off the wires of access control readers. When a badge is scanned, the Access Control Reader decodes the information in the card, and communicates this data over a wired connection to the authenticatio
Check Point Research, the Intelligence and research arm of Check Point Technologies provides leading cyber threat intelligence to Check Point customers and the greater intelligence community.