Bluetooth experimentation framework for Broadcom and Cypress chips.Broadcom chips are used in approximately a billion of devices, such as all iPhones, MacBooks, the Samsung Galaxy S series, the older Google Nexus series, older Thinkpads, Raspberry Pis, various IoT devices, and more. In 2016, Cypress acquired the IoT division of Broadcom. Since then, firmware variants slightly diverged, as Broadcom kept non-IoT customers like Apple and Samsung. However, the firmware interaction and update mechanism stayed the same. We reverse-engineered how the operating systems patch this firmware and interact with it. Based on that we developed a Bluetooth experimentation framework, which is able to patch the firmware. This enables various features that otherwise would only be possible with a full-stack software-defined radio implementation, such as injecting and monitoring packets on the link layer.
Every vintage Apple Mac enthusiast knows the importance of having a stockpile of key software to call upon when refurbishing or maintaining their collection. Well, here’s an off-the-shelf solution that’ll answer the prayers of many of us. This is a treasure trove of essential utilities that every Classic Mac OS user absolutely needs to have.
Everything is packed into a single three hundred meg .sit archive to make it easy to grab. Download it, unpack it, and there you have it.
I'm sure that, like me, you were asked to put your USB drive in an unknown device... and then the doubt: What happened to my poor dongle, behind the scene? Stealing my files? Encrypting them? Or just installing a malware? With USBvalve you can spot this out in seconds: built on super cheap off-the-shelf hardware you can quickly test any USB file system activity and understand what is going on before it's too late!
With USBvalve you can have an immediate feedback about what happen to the drive; the screen will show you if the fake filesystem built on the device is accessed, read or written.
tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others. In addition, tinc offers encryption, authentication, compression, automatic mesh routing, NAT traversal, and network bridging. Supports IPv6, too.
Git: https://www.tinc-vpn.org/git/browse?p=tinc
In the AUR.
I've tried pretty much every other smartwatch on Earth, yet I still wear my Pebble every day—nothing else matches its features and long battery life. I really, really, really hoped someone else would create a proper replacement, but no one has stepped up, and my stash of old Pebbles is dwindling!
It's time to take matters into my own hands. A small team and I are working on a new Pebble-like smartwatch that runs open source PebbleOS, has the same beloved features (plus some fun new stuff), and stays true to the core Pebble vision. If enough people are interested, we'll build it. Sign up to get one!
Google (which purchased Fitbit, which had bought Pebble) still owns PebbleOS. Over the last year, a team inside Google (including some amazing ex-Pebblers turned Googlers) has been working on open sourcing the OS! The source code for PebbleOS is now available at github.com/google/pebble. Read more on their blog.
The original ELIZA running in an emulated CTSS environment. The setup process involves compiling a copy of the s709 IBM 7094 emulator. A copy of CTSS is then installed and started inside the emulator, and then Eliza is compiled and executed.
An open source threat intel and sharing platform. Lots of ad-hoc visualization methods are available to make sense of data. Includes lots of taxonomies to organize data and do some of the work for you.
You can store your IOCs in a structured manner, and thus enjoy the correlation, automated exports for IDS, or SIEM, in STIX or OpenIOC and synchronize to other MISPs. You can now leverage the value of your data without effort and in an automated manner. The primary goal of MISP is to be used. This is why simplicity is the driving force behind the project. Storing and especially using information about threats and malware should not be difficult. MISP is there to help you get the maximum out of your data without unmanageable complexity. MISP will make it easier for you to share with, but also to receive from trusted partners and trust-groups. Sharing also enabled collaborative analysis and prevents you from doing the work someone else already did before.
Threat Intelligence is much more than Indicators of Compromise. This is why MISP provides metadata tagging, feeds, visualization and even allows you to integrate with other tools for further analysis thanks to its open protocols and data formats. Having access to a large amount of Threat information through MISP Threat Sharing communities gives you outstanding opportunities to aggregate this information and take the process of trying to understand how all this data fits together telling a broader story to the next level. We are transforming technical data or indicators of compromise (IOCs) into cyber threat intelligence. MISP comes with many visualization options helping analysts find the answers they are looking for.
Github: https://github.com/MISP/
Of interest:
There are more repos but I haven't gone through them yet.
XAMPP is a completely free, easy to install Apache distribution containing MariaDB, PHP, and Perl. The XAMPP open source package has been set up to be incredibly easy to install and to use.
The goal of XAMPP is to build an easy to install distribution for developers to get into the world of Apache. To make it convenient for developers, XAMPP is configured with all features turned on. In the case of commercial use please take a look at the product licenses, from the XAMPP point of view commercial use is also free. There are currently distributions for Windows, Linux, and OS X.
Keychain helps you to manage SSH and GPG keys in a convenient and secure manner. It acts as a frontend to ssh-agent and ssh-add, but allows you to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session.
This dramatically reduces the number of times you need to enter your passphrase. With keychain, you only need to enter a passphrase once every time your local machine is rebooted. Keychain also makes it easy for remote cron jobs to securely "hook in" to a long-running ssh-agent process, allowing your scripts to take advantage of key-based logins.
If your workflow is such that you have one terminal window but multiple tabs, this will fix quite a few annoyances.
Github: https://github.com/funtoo/keychain
Works very well on Linux, I've been using it for years. Also works on OSX; it's in Homebrew.
An ESP8266 based RS232 <-> WiFi modem with Hayes AT style commands and LED indicators. It makes the appropriate noises.
This project grew out of a desire to get an old Ampro LB+/Z80 hooked up to the Internet. Right from the start, I knew I wanted a row of LED indicators at the front of the modem so that it would be reminiscent of an old Hayes Smartmodem. (I briefly considered finding an old Smartmodem on eBay, but soon remembered that the case had in fact been made of metal; they don't build 'em like that anymore.) Since the modem was going to be hooked up to the Little Board's serial port, I needed an actual RS-232 level serial port, with either a DB-25 or DE-9 connector. And finally, since I wanted the Hayes style LEDs, I thought it would be handy to have the Hayes AT commands too, at least as close as I could manage.
This is the sort of project that you can build yourself, for fun. Even the right kinds of project boxes are linked in the bill of materials, along with the Kicad schematics and greyprints for the panels.
The default serial configuration is 9600bps, 8 data bits, no parity, 1 stop bit.
A disaster-resilient communications network powered by the sun.
When the critical infrastructure that so many of us take for granted goes away, how do we organize ourselves and our communities to respond?
If recent ecological disasters have demonstrated anything, it is the inadequacy of existing models and tools to provide efficient allocation of resources, access to emergency communications, and effective coordination of human effort. Few if any solutions exist that are off-grid, affordable, reliable, easily deployed, and openly standardized.
The project started when my mechanical Ferraris energy counter was replaced with a digital smart meter from eBZ. The DD3 model provides an IR signal which can be read once a second with a simple IR receiver. Initially I used just an Arduino with a photo transistor circuit on a breadboard to read the signal. Later I have built an IR dongle on a real PCB in a nice case for permanent mounting on top of the smart meter.
For the software side, the Smartmeter program reads the raw stream of data from the energy meter and forwards it as a JSON formatted string to a MQTT broker on the network. The data is stored in a TimescaleDB database and visualised on a Grafana dashboard.
In the AUR.
O&O ShutUp10++ means you have full control over which comfort functions under Windows 10 and Windows 11 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 and Windows 11 should respect your privacy by deciding which unwanted functions should be deactivated. This software is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!
Disable Windows Copilot+ Recall, alter your security settings, control location services, disable telemetry for Microsoft Office, deny transmission of user data and diagnostics. Free of charge for private users, companies and educational institutions. Supports all Microsoft Windows 11 and Windows 10 builds. Available in multiple languages.
A BBS server for Meshtastic for posting bulletins, sending mail to users, and channel directory. Tries to work like most ax.25 packet radio BBSes. Requires access to a Meshtastic node for access to the network and the node ID of at least one other TC2 BBS to plug itself into the network.
This project is about delivering a ready-to-use IT infrastructure suitable for bootstrapping a small company, all self-hosted and supported by Open Source. The initial target platform is for a NetBSD/EdgeBSD NVMM hypervisor and a collection of guest VMs, with the software deployed with pkgsrc.
Stands up an OpenLDAP server, BIND for DNS, e-mail infrastructure (including webmail), Nextcloud, Gitea, Jitsi Meet, and a public website by running a handful of commands on a blank machine.
Frozen intends to be a radio BBS optimized for slow connections. This is the very beginning of the project. The current status is that Frozen has a working message board, an admin tool to manage data, a terminal client to interact with the BBS, and a (very crummy!) connection to Meshtastic radios.
Now has a bill of materials for constructing your own server.
Privastead is a privacy-preserving home security camera solution that uses end-to-end encryption. It has three key benefits: End-to-end encryption using the OpenMLS implementation of the Messaging Layer Security (MLS) protocol. Software-only solution that works with existing IP cameras with minimal trust assumptions about the IP camera. Rust implementation (camera hub, MLS code for the mobile app, and untrusted server).
The Privastead camera solution has three components: A camera hub, which runs on a local machine and directly interacts with IP camera(s). A mobile app that allows one to receive event notifications (e.g., motion) as well as livestream the camera remotely. An untrusted server that relays (encrypted) messages between the hub and the app. In addition, Privastead uses the Google Firebase Cloud Messaging (FCM) for notifications. Similar to the server, FCM is untrusted.
Meshtastic® is a project that enables you to use inexpensive LoRa radios as a long range off-grid communication platform in areas without existing or reliable communications infrastructure. This project is 100% community driven and open source!
Long range (331km record by MartinR7 & alleg). No phone required for mesh communication. Decentralized communication - no dedicated router required. Encrypted. Excellent battery life. Send and receive text messages between members of the mesh. Optional GPS based location features.
Meshtastic utilizes LoRa, a long-range radio protocol, which is widely accessible in most regions without the need for additional licenses or certifications, unlike HAM radio operations. These radios are designed to rebroadcast messages they receive, forming a mesh network. This setup ensures that every group member, including those at the furthest distance, can receive messages. Additionally, Meshtastic radios can be paired with a single phone, allowing friends and family to send messages directly to your specific radio. It's important to note that each device is capable of supporting a connection from only one user at a time.
A curated list of awesome open source healthcare software, libraries, tools and resources. Each link has been vetted to ensure the project is active and provides value to healthcare facilities, providers, developers, policy experts, and/or research scientists.
A replacement file manager for Windows that tries to suck less. Especially if you disabled Recall and it retaliated by breaking the existing file manager. Supports multiple tabs. Cloud storage provider integration. Configurable layouts. Supports tagging files and folders. Explore and edit compressed archives. File preview. Git integration.
Download the classic installer or buy it through the Microsoft Store to help support the project.