CatSniffer is an original multiprotocol and multiband board made for sniffing and communicating with IoT (Internet of Things) devices. It was designed as a highly portable USB stick that integrates the new generation of the chips TI CC1352, Semtech SX1262, and Microchip SAMD21E17.
This board is an auditing tool for security researchers looking into IoT security. The board can be used with different types of software including third-party sniffers such as SmartRF Packet Sniffer, Sniffle, zigbee2mqtt, Z-Stack-firmware, our custom firmware, or you can even write your own firmware for your hacking needs.
It can also be (pre-)ordered here: https://electroniccats.com/store/catsniffer/
Briand's project to turn an ESP32 microcontroller board into a plug play Tor client.
The goal is to write a very simple C++17 working Tor proxy for ESP32 so the ESP32 could be attached to any computer with a bash/dos/putty client ready-to-go. Using ESP as a proxy allows to keep no traces of Tor client/browser on your computer (but traces of the navigation history and so on are not avoided!)
REMEMBER: The ESP32 is a 240MHz processor with 320KB of RAM. Do not expect good performance or fast webpage loading!
An open source firmware for DSO-138 oscilloscope, based on the ARM Cortex M3 STM32F103 processor core. The firmware adds two analog channels, two digital channels (if you patch onto pins PA13 and PA14 on the board), a serial interface (over USB, probably), selectable source triggers, support for a retrofitted rotary encoder, and 2k sample depth. The tradeoff is that 10 µs sampling had to be removed to make room.
To flash the firmware you have to use a TTL-to-USB converter to patch directly onto jumpers J1 and J2 on the mainboard. No USB support, remember?
Alternative firmware for ESP8266 and ESP32 with easy configuration using webUI, OTA updates, automation using timers or rules, expandability and entirely local control over MQTT, HTTP, Serial or KNX. Written for PlatformIO with limited support for the Arduino IDE.
Seems to automatically update itself from a known-good location. That can probably be turned off.
A Python-based, open source, platform independent, utility to communicate with the ROM bootloader in Espressif ESP8266 & ESP32 chips. Python 2 and 3 compatible. Can use this to dump the firmware for analysis. Depends upon pySerial.
An interactive explorer of the disassemblies of the BASIC ROMs and kernels for the various versions of the Commodore 64. Each ROM is disassembled and lined up side by side so you can see what's different between versions and hardware releases.
3745 links, including 199 private