FREE-WILi is the embedded development tool you’ve been waiting for. Designed to simplify the process of testing, debugging, and developing electronic systems, FREE-WiLi is packed with a wide array of interfaces and features to handle all your development needs.
Supports I2C, SPI, PIO, UART over GPIO pins. USB interfaces. Programmable voltages. Has an FPGA on board for emulating other devices. SMA connectors for antennae. IR transmission and reception. Speaker and microphone.
They even ported the firmware to the Defcon 32 badge.
The Tick is the next evolution in covert access control system implants. Designed for a seamless integration behind card readers, The Tick silently intercepts, logs, and replays access credentials with greater efficiency and stealth than ever before. Compatible with a wide range of RFID systems, provides invaluable (to red teamers) insights into facility (in)security, while enabling advanced credential injection.
Once installed behind an access control unit, you can interact with it over Bluetooth or wifi to configure it, extract what it's captured so far, and upgrade the firmware.
A shell script to automate the setup of Linux router for IoT device traffic analysis and SSL MITM. It looks like it assumes that you're running it on an OpenWRT device (but I could be wrong).
A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application. This could also be useful if you're trying to reverse engineer the API a mobile app uses.
The Lainzine is a free, not-for-profit zine created (largely) by / for fans of the late-90s anime Serial Experiments Lain and the many relevant communities, websites, and dusty art-projects it has inspired over the last decades. topics covered include "digital life", the intersection of art and computers, cyberpunk themes, programming and opsec, pseudo-religious technobabble, and whatever else people feel like sharing, all presented in a lain-inspired a e s t h e t i q u e format.
If any of the topics above seem interesting to you, have a look at the archive. "production quality" varies a bit, as it's taken a while to figure out how best to present things and make them all pretty, but there's still interesting stuff to read no matter which you pick up.
And, if you like what you see there and have something you want to share as well, please don't hesitate to read the submission guidelines and do so! as a free community project, the lainzine is what people make of it, with those people being anyone at all who feels some sort of affiliation with lain and the many things the name has come to mean. so don't feel like your work or ideas don't belong just because they differ a bit from what's been in past zines. we're all connected, after all.
Hackers Teaching Hackers is an Information Security practitioner conference held annually in Columbus Ohio. Founded in 2014, attendees are offered an array of hands-on educational experiences through villages, capture the flag (CTF) challenges, scavenger hunts, speakers, and general networking opportunities. Anyone with a curious thirst for knowledge is welcome: hackers, defenders, makers, breakers, tinkerers, and hobbyists.
We are all hackers. Always learning, but with something to share.
It looks like a cute continuation of the Pwnagotchi project with some additional functionality. Installation is scripted (but can be done manually). There are no OS images to download (yet, anyway).
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potential vulnerabilities. Bjorn can perform brute force attacks, file stealing, host zombification, and supports custom attack scripts.
flashrom is a utility for detecting, reading, writing, verifying and erasing flash chips. It is often used to flash BIOS/EFI/coreboot/firmware images in-system using a supported mainboard, but it also supports flashing of network cards (NICs), SATA controller cards, and other external devices which can program flash chips. Can also be used for dumping the contents of SPI chips for analysis.
It supports a wide range of flash chips (most commonly found in SOIC8, DIP8, SOIC16, WSON8, PLCC32, DIP32, TSOP32, and TSOP40 packages), which use various protocols such as LPC, FWH, parallel flash, or SPI.
A Python-based CLI for PN532 and PN532Killer. Supports the PN532 with USB Serial Chip in HSU Mode, the All-in-one PN532, and the PN532Killer. Supports ISO 14443A, 14443B, 15693, adn EM4100.
Pacific Hacker Conference is an information security and hacking conference that gathers the brightest minds in cybersecurity and hacking from Silicon Valley and beyond. Focusing on cutting-edge techniques, research, and developments, we aim to create an environment where knowledge is shared and connections are made. Our audience ranges from security professionals, researchers, and ethical hackers to industry decision-makers. We keep the Conference small, allowing us to provide what other Cons leave out.
We provide presentation tracks, a workshop track, and a place to chill and learn while connecting with other like-minded individuals. No egos. No divas. It’s just a good time and good content. Join the conversation.
While each PHA event is distinct, we welcome anyone interested in the cybersecurity community to attend. Pacific Hackers Conference is an event for all levels of experience and diverse backgrounds – from the industry professionals offsetting or augmenting their current security skill set, to the students looking for potential career opportunities in the security community, as well as industry leaders looking to share their vast experiences. One thing they all have in common is a desire to connect with others in the community and discuss emerging issues. These are connections and experiences they can call upon throughout their career.
Held at Hacker Dojo in Mountain View, CA. Looks surprisingly inexpensive.
A MicroPython port for the famous Flipper Zero. No need to learn C: Use your favorite programming language to create apps, games and scripts. .py files are copied onto the Flipper Zero's microSD card. Adding Python support to the Flipper Zero platform was only possible by rigorously sorting out unnecessary language features. I didn't know it was possible to sift even more stuff out of Python to make an embedded version, but so far the list of what they removed makes sense. Be careful with external Micropython modules, though.
Support for basic language constructs like functions, classes, loops, and so forth. Access the Flipper’s hardware: buttons, speaker, LED, GPIO, ADC, PWM, etc. No custom firmware required so no risk of bricking your Flipper.
API documentation: https://ofabel.github.io/mp-flipper/reference.html
Girls Who Hack was started by 12 year old BiaSciLab who wanted to share her passion for hacking with other girls. A natural speaker and teacher, BiaSciLab thought bringing everything together in one place would get more girls excited about learning this valuable life skill.
A 501(c)(3) non-profit organization.
AtomGPS Wigler is a wardriving tool originally created by @lozaning. For use with the M5Stack Atom GPS kit, this tool is specifically designed for Wi-Fi network geolocation. LED status indicators are outlined below. Wigle compatible CSV files are written to SD.
Requires an M5 AtomGPS unit, an SD card, and the Arduino IDE or Esptool.py to flash the firmware.
Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented instructions. Props to JTAG scanner and Arduinull which came before JTAGenum and forwhich much of the code and logic is based on.
T-shirts sold by the Connections Museum in Seattle.
cve-maker is a hub for finding CVEs and exploits. It is based on the official NIST, ExploitDB and Github databases. The tool makes it quick and easy to search for CVEs and their associated exploits. It is able to detect exploit compilation options. It can also be used to list the latest critical vulnerabilities.
This is an amalgam of TTP's on different offensive ML attacks encompassing the ML supply chain and adversarial ML attacks.
It is focused heavily on attacks that have code you can use to perform the attacks right away, rather than a database of research papers. (PoC or GTFO type logic). Generally speaking if it is here I have tested it and it works. The intent is to help red teams and offensive practitioners quickly understand what tool in the toolbox to use to attack ML environments.
This is a living vault. It is very much not a finished list of resources. There are pages that are polished, and some that are little more than placeholders with a few bullet points that I jotted down during conferences or on the fly.
The goal is to organize the attacks in a way that is useful to red team operators rather than useful for say, academics trying to understand adversarial ML.
The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created by the community. Please note, this repository is a community-driven project and may not list all existing GPT agents in cybersecurity. Contributions are welcome – feel free to add your own creations!
Disclaimer: Users should exercise caution and evaluate the agents before use. Additionally, please note that some of these GPTs are still in experimental test phase.
We’re an amateur phone collective in Philadelphia! Are you a hacker, artist, or engineer? We need your help!
PhilTel is looking to install new (to us) payphones within the city of Philadelphia. Any payphone installed will be completely free-to-use, allowing the user to place calls within North America. Additionally, we would like to provide various experiences and services through the phones; these could be as simple as voicemail, fun as a phone number that randomly calls other payphones, or as complex as an integration with phone collectors’ networks to allow phone-phreaking and exploration!
JawnCon is an event that celebrates the evolution of security and technology in our lives. Forged in the fires that is everything Philly, this event is driven to educate, celebrate and better understand all the things that make these weird machines blink and go bump in the night.