This project demonstrates some possibilities for computational magic and telematic and automatic telesmata, and is intended to provoke discussion about the expression, automation, and trivialization of magic through technology. The basic concepts underlying the technology are based largely on several of Peter J. Carroll’s ideas.
A large gallery of photographs from Defcon, Blackhat, and a few other things.
Clock Web App is an Open Source project that brings a feature rich Clock app to any system for completely free. It is developed for Web Based Operating Systems and is powerful software that is easy to use and easy to develop as it has a clean code base. Clone the repo, serve the public/
subdirectory, and that's it. No build process.
Threat Modeling is the process of building and analyzing representations of a system to highlight concerns about security characteristics.
Threat Modeling is a pro-active and iterative approach for identifying security issues and reducing risk. The output of a threat modeling exercise is a list of threats - or even better - risks, that further inform decisions in the continued operation of the system. This process can be performed prior to any code written or infrastructure deployed. This makes it very efficient in identifying potential threats, vulnerabilities and risks.
How to add Redis caching support to a Ruby on Rails application.
restic is a backup program that is fast, efficient and secure. It supports the three major operating systems (Linux, macOS, Windows) and a few smaller ones (FreeBSD, OpenBSD).
This is the Game of Life written in Python 3.10. It uses tkinter for the GUI; in fact I wrote it as an exercise in using tkinter as it's been a couple years since I last played with it.
Each cell of the game is a canvas rectangle. The id of each rectangle is stored in an matrix, shifted left by two. The bottom two bits of each shifted id are used to store the current state of the cell and the next state of the cell.
A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. Full featured hex editor. Byte patching. Patch management. Copy and paste byte sequences. String and hex pattern highlighting. Pattern matching DSL. Huge file support. Can disassemble 16 different architectures' code and counting.
A growing database of homebrew, indie and aftermarket games for retro and retro-like platforms.
Summercon is one of the oldest hacker conventions, and the longest running such conference in America. It helped set a precedent for more modern “cons” such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, New York, Washington, D.C., Austin, Las Vegas, and Amsterdam.
A computer mystery/romance/hacking simulator set five minutes into the future of 1988.
Ports for Windows, OSX, and Linux are downloadable from here. Creative Commons licensed.
Xenia, the fox girl mascot of Linux, was first designed in 1996 by Alan Mackey. She was meant to be an alternative to Tux, the official mascot. Something that would resurface in an article years later.
Many aircraft broadcast information about how accurate their navigation system, which is almost always GPS, is at any given moment. The GPSJam map aggregates that data over 24 hours in time bins it into a hexagonal map. Green hexagons show where more than 98% of all aircraft who flew through that area reported good navigation accuracy. Yellow hexagons show where between 2% and 10% of aircraft reported low navigation accuracy. Red hexagons show where more than 10% of aircraft reported low navigation accuracy.
Data is pulled from ADSB Exchange.
DrSchottky's fork of the Pwnagotchi firmware so that development can continue.
OpenOversight is a Seattle Tech Bloc project that aims to improve law enforcement visibility and transparency using public and crowdsourced data. We maintain databases, digital galleries, and profiles of individual law enforcement officers from departments the so called Pacific Northwest that consolidate information including names, birthdates, mentions in news articles, salaries, and photographs.
This project is a response to the lack of transparency and justice in policing. The public should have the right to know which officers are patrolling their neighborhoods and watching their communities. When officers abuse their positions of power, they should be able to be easily identified and held accountable.
t is the first project of its kind in the United States, and was first implemented in Chicago in October 2016. OpenOversight launched in the East Bay of the San Francisco Bay Area in fall 2017 and in New York City in 2018. A Baltimore instance was launched in 2019 at BPDWatch.com. A Portland instance was launched around the same time at cops.photo.
The ATMegaZero is a microcontroller board based on the Atmel ATMega32U4 microchip, the same chip used in the Arduino Leonardo and Arduino Micro. It was modeled after the Raspberry PI Zero to take advantage of its sleek design and form factor but in the form of a microcontroller board. Similar to the Raspberry Pi Zero the ATMegaZero comes with 40 GPIO pins that can be used as input or output for interfacing devices and can be programmed using the Arduino IDE software. The ATMegaZero comes with a built-in USB which makes the ATMegaZero recognizable as a mouse or keyboard.
Two extant variants at this time: One based upon the ATMega32U4 (older) and one based upon the ESP32-S2 (newer) (CircuitPython compatible).
An ACME protocol client written purely in Shell (Unix shell) language.
Full ACME protocol implementation. Support ECDSA certs. Support SAN and wildcard certs. Simple, powerful and very easy to use. You only need 3 minutes to learn it. Bash, dash and sh compatible. Purely written in Shell with no dependencies on python. Self-contained, just one script is needed to issue, renew and install your certificates automatically. DOES NOT require root/sudoer access. Docker ready. IPv6 ready. Cron job notifications for renewal or error etc.