
Lists (9)
Sort Name ascending (A-Z)
Starred repositories
Production-tested AI infrastructure tools for efficient AGI development and community-driven innovation
Tiny MCP server with cryptography tools, sufficient to establish end-to-end encryption between LLM agents
Reverse Engineering: Decompiling Binary Code with Large Language Models
Lilygo T-Embed, CC1101 backpack, rtl_433_esp + OOK
Sub-GHz and GPS test platform (spectrum-analyzer, jammer)
Play with Sub1Ghz signals (300-348MHz, 387-464MHz, 779-928MHz). Scan, decode, store. Garage doors, barriers, IoT sensors...
Repository containing LoRaWAN sniffer device source code and tools for network traffic analysis
Skinny Research and Development LoRa Scanner Utility
USB Army Knife – the ultimate close access tool for penetration testers and red teamers.
Miniature rack builds, for portable or compact Homelabs.
This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or pentest the security of a LoraWAN infrastructure.
Reverse engineered wifi driver for the ESP32
Tools for controlling webcam LED on ThinkPad X230
Ghost ESP is a ESP32 Firmware that Revolutionizes the way we use ESP32 devices in a Pen Testing aspect
CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices using the latest radio IoT protocols. It is a highly portable…
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse …
Generates millions of keyword-based password mutations in seconds.
Open source handheld ham radio project KV4P-HT
An Open-source LTE Downlink/Uplink Eavesdropper
ESP32-based BLE and WiFi scanner for real-time device discovery and tracking. Designed for network analysis and counter-surveillance.
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A powerful and user-friendly binary analysis platform!
a network traffic anomaly detector that captures and analyzes network packets to identify anomalous behavior. It uses machine learning techniques to detect deviations from normal traffic patterns /…