dipusone's repositories
amiibo-maker
Pure python implementation of an nfc amiibo reader/writer
inputShieldProtection
Arduino shield with automatic level shifting capabilities
openhantek
OpenHantek is a free software for Hantek (Voltcraft/Darkwire/Protek/Acetech) USB DSOs based on HantekDSO.
binja-cLEMENCy-plugin
Binary Ninja plugin for the cLEMENCy architecture written during DEF CON CTF 2017
OctoPrint-Pushjet
A Pushjet notification plugin for Octoprint
pyscreenshot
Simple wrapper in QT for import with configuration
dlms-cosem-ns-3
Automatically exported from code.google.com/p/dlms-cosem-ns-3
dumbxinputemu
xinput reimplementation compatibile with DirectInput controllers
EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
FShell
My python3 implementation of a Forward Shell
gallery3-integration-for-drupal
Simple plugin to integrate the user managment of drupal and gallery
gophish
Open-Source Phishing Toolkit
gr-osmosdr
Mirrored from git://git.osmocom.org/gr-osmosdr
JTAGenum
Given an Arduino compatible microcontroller or Raspberry PI, JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented instructions. Props to JTAG scanner and Arduinull which came before JTAGenum and forwhich much of the code and logic is based on. Feel free to branch and modify religiously (readme, credits, whatever)
onedriveClient
A Microsoft OneDrive client for Linux, written in Python3.
opensprinkler
Open-source Arduino-based Sprinkler Valve Controller
openvpn-install
OpenVPN road warrior installer for Debian, Ubuntu and CentOS
plugins.octoprint.org
Sources of the OctoPrint Plugin Repository
PracticalMalwareAnalysis-Labs
Binaries for the book Practical Malware Analysis
proxmark3
Proxmark 3
pyamiibo
PyAmiibo is a library for manipulating Amiibo dumps.
self-service-password
Web interface to change and reset password in an LDAP directory
wifiphisher
Rogue Access Point framework for Wi-Fi automatic association attacks and victim-customized phishing