layout | title | nav_order | description | image | permalink | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|
default |
home |
1 |
A place for learning electronics and making hardware+firmware+software prototypes for hackers and education |
|
/ |
{: .fs-9 }
A place for learning electronics and making hardware+firmware+software prototypes for hackers and education {: .fs-6 .fw-300 }
All with MIT License{:target="_blank"} when it is possible
github{:target="_blank" .btn .btn-primary .fs-5 .mb-4 .mb-md-0 .mr-2} twitter{:target="_blank" .btn .fs-5 .mb-4 .mb-md-0}
[ [{: }]]({{ site.baseurl }}{% link buy_rpk2.md %})
[evil mass storage]({{ site.baseurl }}{% link evil_mass_storage/evil_mass_storage.md %}) is a proof of concept USB composite device which demonstrates an end-to-end solution that infiltrates an isolated-offline-network and covertly extracts data over both radio frequency or close access covert storage while hiding from forensic analysis.
demo:
{% include youtubePlayer.html id="jhEnWRdobY4" %}