p8-smartwatch-hacking
lockphish
p8-smartwatch-hacking | lockphish | |
---|---|---|
2 | 1 | |
43 | 676 | |
- | - | |
1.8 | 0.0 | |
over 3 years ago | almost 3 years ago | |
HTML | HTML | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
p8-smartwatch-hacking
- The PineTime Open Source Smartwatch Goes on Sale for $27
-
Hack together your own e-paper smartwatch with this $50 open-source kit
The Colmi P8 is the same hardware and looks that the PineTime. There is an arduino firmware for it!
https://github.com/Jac-eko/p8-smartwatch-hacking
lockphish
What are some alternatives?
WatchX - Open-source smart watch, based on LittlevGL Embedded GUI Library
CiLocks - Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
kubernetes-goat - Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
onex - Onex is a package manager for hacker's. Onex manage more than 400+ hacking tools that can be installed on single click.
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Ghost - Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
fish - 🐟 Soothing pastel theme for the Fish Shell
AIRAVAT - A multifunctional Android RAT with GUI based Web Panel without port forwarding.
hackenv - Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs, Hack The Box, etc.) :rocket::wrench:
vapi - vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Hemera - O Hemera é um Software voltado para o desenvolvimento de Phishings. Seu intuito é auxiliar nos estudos de segurança digital.
penetration_testing - 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.