1. WebscanBrowser-based network scanner & local-IP detection
2. CombobreakerMotorized, portable, 3D printed, Arduino-based combination lock cracker
3. FriskyInstruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS
4. QuickjackQuickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.
5. PwnatThe only tool and technique to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, STUN/TURN/UPnP/ICE, or…
6. DingdongDigital Ding Dong Ditch -- RTL-SDR + Arduino + GSM/SMS/FONA + RF + GQRX to hack a wireless doorbell from a text message
7. SlipstreamNAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website
8. SkyjackA drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under your control.
9. JiagraJavascript/Website Performance Enhancement
10. Myo OscOSC bridge for the Thalmic Myo gesture control armband (cross-platform)
11. UsbdrivebyUSBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
12. Sqlppfeature-rich, multi-database interfacing, multi-connection, colorful console-based SQL client
13. KeysweeperKeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity.
14. PoisontapExploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
15. OpensesameOpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy
16. EvercookieProduces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.
17. SamytoolsSimple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle piping. Mostly *nix tools with an emphasis on macOS.
18. ProxygambitAnonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced resurrection of ProxyHam)
19. MagspoofA portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
22. bgridwireless balloon LED network w/ATtiny24 + nRF24L01+ (PCB + firmware + TouchDesigner)
25. BPLThe Blind Public License is a restrictive license that does not allow any person to read, view, interpret, emulate, debug, disassemble, reverse engineer, or execute ("Observing") any included code, schematics or engineering diagrams (the "Technology").
27. easel-driverEasel driver for Linux, Mac, Windows, ARM, Raspberry Pi, Intel, FTDI, CH340, CH341, CP210x, FTDI clones, local, and remote access to GRBL-based CNC controllers