roomtemperatureiq's Projects
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity.
Owners contract for the makers fees distribution and crowdsale.
A tool to retrieve malware directly from the source for security researchers.
mauveparagon - Web 9000
Tiny modular assembler & vm for lightweight control microcode
[EXPERIMENTAL] Raspberry Pi 3 Wireless AP (WPA2) + DNSSEC + OpenVPN (iptables VPN Killswitch)
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
Kali
Convert 802.11 Packet Traces to XML and SQLITE Format
Incredibly fast crawler designed for recon.
Pluto is a programmable digital watch that re-uses case and LCD panel of the Casio® F-91W. (Software)
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
A curated list of free public proxy servers
SteamOS Hardware-Accelerated VNC Server
Collection of miscellaneous scripts and tools
better than 1 min chart
A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under your control.
Node + Socket.IO + MooTools + Twitter + Space Invaders = space-tweet (a visualization of good vs. evil)
A tool for analyzing firewall rules
SSH to your machines without remembering IPs and forwarding ports
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
The goerli testnet configuration
A simple useless rootkit for the linux kernel. It basically a kernel module which hooks up the open() syscall (or potentially any syscall) to replace it with a custom function.
Automatically exported from code.google.com/p/unix-privesc-check
Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurations that could allow local unprivileged user to escalate to other users (e.g. root) or to access local apps (e.g. databases). This is a collaborative rework of version 1.0
USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
Security Techniques