分类 默认分类 下的文章

raspberry 2/3/4 zero 5inch 7inch tft ips screen for retropie

496341641.jpg
768484364.jpg
1009554322.jpg

add follow to tf card config.txt

For more options and information see

http://rpf.io/configtxt

Some settings may impact device functionality. See link above for details

Set GPIO pins to 24-Bit DPI Mode 7

GPIO 0 and 1 needed for DPI Clock and Data Enable

gpio=0=a2,np
gpio=1=a2,np

Set GPIO pins 2 and 3 to I2C Mode. These can be used for other things, if needed.

gpio=2=a0,np
gpio=3=a0,np

Set up color pins

gpio=4=a2,np
gpio=5=a2,np
gpio=6=a2,np
gpio=7=a2,np
gpio=8=a2,np
gpio=9=a2,np
gpio=10=a2,np
gpio=11=a2,np
gpio=12=a2,np
gpio=13=a2,np
gpio=14=a2,np
gpio=15=a2,np
gpio=16=a2,np
gpio=17=a2,np
gpio=18=a2,np
gpio=19=a2,np
gpio=20=a2,np
gpio=21=a2,np
gpio=22=a2,np
gpio=23=a2,np
gpio=24=a2,np
gpio=25=a2,np
gpio=26=a2,np
gpio=27=a2,np

Configure DPI signal

framebuffer_width=800
framebuffer_height=480
enable_dpi_lcd=1
display_default_lcd=1
dpi_group=2
dpi_mode=87
dpi_output_format=503847
dpi_timings=800 0 40 48 88 480 0 13 3 32 0 0 0 60 0 32000000 6

HackRF-Portapack Files for the DeBruijn attack!

This is a Github repository devoted to delivering to you the required files to perform the DeBruijn attack from your HackRF-Portapack

This is for educational purposes only. I am in NO WAY liable for any actions executed by means of the contents within this repository. PLEASE use responsibly.

If unfamiliar with the debruijn attack: this attack transmits a single signal that contains every possible combination of a specific bit-length in just seconds by overlapping binary sequences

The files I am sharing only go from 8 to 12 bits which should suffice in any and all situations that apply

A list of devices that are vulnerable to this attack consists of but is not limited to:

• Garage doors • Automatic gates • Cars

This attack will NOT work on devices that utilize rolling codes

Prerequisites:
Hardware:
• HackRF and Portapack

Getting started:
Transfer these files to a folder called "DeBruijn" at the root of your Portapack's SD card.

To perform the attack(s), simply use the "Replay" function within the "Havoc" or "Mayhem" firmware and choose one of these files in the "DeBruijn" folder

These files are labeled according to what type of key/remote they are calculated for based on bit-length

Have fun, and USE RESPONSIBLY

If you'd like to use trinary sequences as well, click here for the full version

OSTAR on bcm2708/zero/zero w/raspberry pi 2b

OSTAR is Opensource so i make a rpi zero/zero w image for test

the image is just 15Mb when comparess,tf card is 500Mb enought
support usb wifi rtl8812eus and zero w wifi for AP mode
usb wifi in Client Mode is not work
OSTAR on rpi is just for LTE EC20/SIM7600 pcie card WAN connection.

ostar running is not stable,DMR not work ,only test YSF function.

if you have zero /zero w and usb LTE module, Running YSF mode you can try it.

if you can't see the Menu,open http://192.168.10.1/cgi-bin/luci/admin/system
use another Therm. and save you can see the Menu

openwrt-brcm2708-bcm2708-rpi-ext4-factory.rar