Lists (3)
Sort Name ascending (A-Z)
Stars
M5Stack Cardputer client for OpenClaw AI agent platform — interactive prompt UI with LCD display, keyboard input, and Wi-Fi communication
MimiClaw: Run OpenClaw on a $5 chip. No OS(Linux). No Node.js. No Mac mini. No Raspberry Pi. No VPS. Hardware agents OS.
MUCH Improved version of the Python Chasing Your Tail Tool to help you determine if you're being followed
🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
Send WiFi Drone RemoteID detections over serial via Meshtastic
Unified firmware links for Mesh-Detect hardware project
Useful tool to track location or mobile number
Collection of WiFi Pineapple Pager Repositories
Pineapple Pager Flock Detection
a port of unipwn onto the pineapple pager. untested!!
🛜 ESPectre 👻 - Motion detection system based on Wi-Fi spectre analysis (CSI), with Home Assistant integration.
A powerful tool for automated LLM fuzzing. It is designed to help developers and security researchers identify and mitigate potential jailbreaks in their LLM APIs.
Exploitation Framework for Embedded Devices
An esphome config running the game of life on a 8x32 led matrix controlled by max7219
Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks
GhostESP: Revival turns your ESP32 into a cheap and powerful wireless testing tool.
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32... T-Deck (Plus) and T-Embed (CC1101) versions are a work in progress. Please stand by. ***Alpha t-deck pre-release firmware li…
out0fstep / Bjorn
Forked from infinition/BjornBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Bjorn Detector: One-Click SSH Access to Your Device in a radar style
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…