Skip to content

Instantly share code, notes, and snippets.

@hackermondev
hackermondev / research.md
Last active May 18, 2025 14:16
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k

#!/bin/bash
cd /usr/local/src/pwnagotchi
sudo git pull
sudo cp -r /usr/local/src/pwnagotchi/pwnagotchi/* /usr/local/lib/python3.7/dist-packages/pwnagotchi/
sudo cp /usr/local/src/pwnagotchi/bin/pwnagotchi /usr/local/bin/pwnagotchi
@equipter
equipter / SAK Swapping.md
Last active April 24, 2025 23:18
Explaination of Mifare Classic SAK Swapping anti cloning defense

Mifare Classic - SAK Swapping Explained

Term Meaning
WUP-SAK SAK Value found during the Wake up & Anti-collision process, what you would see reported from a basic search.
Vanity SAK SAK Value represented in Block 0 of a Mifare Classic, on legitimate cards this does not inform the value of the WUP-SAK.
Magic Card An illegitimate card capable of changing it's UID; some magic cards are also able to change other values such as ATQA/SAK.
@rscs
rscs / FlipperZero-RFID-blanks.md
Last active January 19, 2025 00:17
Rewritable RFID blanks for Flipper Zero

A list of rewritable RFID blanks that are compatible with Flipper Zero.

X indicates a particular protocol is writable.

? indicates it is unknown if a particular protocol is writable.

Brand Type Chip EM4100 H10301 Indala26 IoProxXSF AWID FDX-A FDX-B HIDProx HIDExt Pyramid Viking Jablotron Paradox PAC/Stanley Keri Gallagher
ETEKJOY Fob EM4305 X X X X X X
@natmchugh
natmchugh / copying-Paxton-fobs.md
Last active March 30, 2025 17:18
How to copy, read and write Paxton fobs and cards with an RFIDler

How to copy, read and write Paxton fobs and cards with an RFIDler

A newer version of this info is available at https://badcfe.org/how-to-paxton-with-rfidler/

Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring: Paxton Fob

Paxton readers often look like this:

Paxton Reader

Usage: D:\DataRoot\Projects\blackmagic\src\blackmagic.exe [options]
-h, --help This help
-l, --list List available supported probes
-v, --verbosity <bitmask> Set the output verbosity, some combination of:
1 = INFO, 2 = GDB, 4 = TARGET, 8 = PROBE, 16 = WIRE
Probe selection options (if used choose one):
-d, -device <path> Use a serial device at the given path (Deprecated!)
-P, probe <number> Use the <number>th debug probe found while scanning the
system, see the output from list for the order
@jinschoi
jinschoi / bitstream-from-sub.py
Created April 17, 2022 18:00
Python script to clean up and recover an OOK bitstream from a Flipper RAW .sub file.
#!/usr/bin/env python
# Find the raw bitstring from a captured Flipper RAW .sub file.
# Must provide the bitlength in ms, and the allowable error which can be tolerated.
import re
import sys
import math
filename = sys.argv[1]
@jinschoi
jinschoi / create_sub.py
Last active February 16, 2025 14:31
Python script to generate Flipper RAW .sub files from OOK bitstreams
#!/usr/bin/env python3
from typing import Iterable, Union, Any
# freq: frequency in Hz
# zerolen: length of space bit in μs
# onelen: length of mark bit in μs
# repeats: number of times to repeat sequence
# pause: time to wait in μs between sequences
# bits: string of ones and zeros to represent sequence
@jamchamb
jamchamb / k360_spi.py
Last active June 22, 2023 07:06
GreatFET script for dumping nRF24LE1 firmware (https://jamchamb.net/2021/05/29/dumping-k360-firmware.html)
#!/usr/bin/python3
import argparse
import hexdump
import struct
import time
from greatfet import GreatFET
def reset(gf, reset_pin):
"""Pulse the reset pin low"""
@petewill
petewill / BlindsMuliRemoteforMySensors.ino
Created December 6, 2020 13:41
MySensors Dooya Blind Control Code
/*
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License
// version 2 as published by the Free Software Foundation.
//
// DESCRIPTION
// This sketch provides a way to control blinds from www.blinds.com using a 433MHz RF
// signal. The motors in the blinds are Dooya DV24CE motors.
// See https://forum.mysensors.org/topic/7/controlling-blinds-com-rf-dooya-motors-with-arduino-and-vera
// for more info.