ATtiny85-USB-Brute-Force-PIN
Minimalist USB brute-force tool using ATtiny85 and V-USB. Emulates a keyboard to test 4-digit PIN combinations for educational cybersecurity demonstrations.
Full repo list rebuilt from your current project data. Old project images are removed and replaced with generated covers designed for this theme.
Minimalist USB brute-force tool using ATtiny85 and V-USB. Emulates a keyboard to test 4-digit PIN combinations for educational cybersecurity demonstrations.
High-performance terminal music player for YouTube Music with playlist management, search history, queue control, and real-time audio visualizer.
Progressive Web App providing semester 2 CF timetable access with offline viewing and lightweight mobile usability.
Self-hosted chat system accessible through Cloudflare Tunnel, designed to stay lightweight and privacy-focused without logs or database-heavy architecture.
AR-powered Polaroid-style experience built with MindAR, exploring browser-based augmented reality interactions.
Advanced scanning tool for username discovery, email breach checking, and subdomain enumeration with OSINT-driven automation.
Frontend implementation for an open-source chat platform designed around real-time communication and interface responsiveness.
Consent-based camera telemetry framework for demonstrating privacy risks and red-team awareness in a controlled educational context.
Consent-based geolocation telemetry framework designed for ethical red-team demonstrations and security awareness training.
Minimalist futuristic Conky widget inspired by Rainmeter's Spectre skin for a clean Linux desktop date and time interface.
Netflix-style IPTV web player with HLS.js support, M3U playlist browsing, and a responsive live streaming interface.
Mobile privacy protection app that detects device tilt and viewer presence to automatically hide sensitive screen content.
Physics-based tilt-controlled maze game where players guide a ball through the maze using phone motion sensors.
Cybersecurity research tool analyzing WiFi credential extraction techniques and attack vectors for defensive awareness.