<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.unloquer.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.unloquer.org/feed.php">
        <title> - personas:brolin:proyectos:hardwarehacking</title>
        <description></description>
        <link>https://wiki.unloquer.org/</link>
        <image rdf:resource="https://wiki.unloquer.org/_media/wiki/logo.png" />
       <dc:date>2026-04-14T21:47:04+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/atecc608a?rev=1720556752&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/bluejammer?rev=1774309137&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/flipperzero?rev=1732206707&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/glasgow?rev=1721865253&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/icreverseeng?rev=1616357169&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/ipadlinux?rev=1764200760&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/limesdr?rev=1681733616&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/orbbecpersee?rev=1681665524&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/rfhackign?rev=1616357370&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/snickerdoodle?rev=1681663141&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/tuyadevices?rev=1733861518&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.unloquer.org/_media/wiki/logo.png">
        <title></title>
        <link>https://wiki.unloquer.org/</link>
        <url>https://wiki.unloquer.org/_media/wiki/logo.png</url>
    </image>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/atecc608a?rev=1720556752&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-07-09T20:25:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>atecc608a</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/atecc608a?rev=1720556752&amp;do=diff</link>
        <description>ATECC608A

	*  &lt;https://ww1.microchip.com/downloads/en/DeviceDoc/40001977A.pdf&gt;
	*  &lt;https://www.microchip.com/en-us/products/security/security-ics/cryptoauthentication-family/use-case-archives/aws-iot-atecc608a&gt;
	*  &lt;https://github.com/sparkfunx/Qwiic_ATECC608A&gt;
	*  &lt;https://cryptotronix.com/2017/11/29/initial-thoughts-on-microchips-new-atecc608a/&gt;
	*  &lt;https://github.com/Coldcard/firmware/blob/master/hardware/schematic-mark3b.png&gt;</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/bluejammer?rev=1774309137&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-03-23T23:38:57+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>bluejammer</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/bluejammer?rev=1774309137&amp;do=diff</link>
        <description>BlueJammer

	*  &lt;https://github.com/EmenstaNougat/ESP32-BlueJammer&gt; -&gt; solo binarios
	*  &lt;https://github.com/cifertech/RF-Clown&gt; -&gt; código









Diseño y fabricación PCB



Se realiza el diseño para un esp32 de 38 pines usando Kicad. Los archivos gerber obtenidos se procesan usango el comando pc2gcode con el siguiente archivo de proyecto millproject:</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/flipperzero?rev=1732206707&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-11-21T16:31:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>flipperzero</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/flipperzero?rev=1732206707&amp;do=diff</link>
        <description>Flipper Zero



References

	*  Capture radio signal with a wire - &lt;https://www.instagram.com/flipper_zero/reel/C5l_ZNrIHV8/&gt;
	*  Detect RF ID signal &lt;https://www.instagram.com/flipper_zero/reel/Cwz2pA5LrPU/&gt;
	*  &lt;https://github.com/xMasterX/all-the-plugins/tree/dev?tab=readme-ov-file&gt; -&gt; &lt;https://github.com/antirez/protoview&gt;

Brief hacklab

Título: Flipper Zero ( -1 ), o los flipper de pobre

En esta ocasión en el hacklab medellín, exploraremos el dispositivo Flipper Zero, las herramientas de …</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/glasgow?rev=1721865253&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-07-24T23:54:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>glasgow</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/glasgow?rev=1721865253&amp;do=diff</link>
        <description>Glasgow Interface Explorer

	*  &lt;https://vvx7.io/posts/2023/07/glasgow-interface-explorer-reading-spi-flash-memory/&gt;</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/icreverseeng?rev=1616357169&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-21T20:06:09+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>icreverseeng</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/icreverseeng?rev=1616357169&amp;do=diff</link>
        <description>IC REVERSE ENGINEERING &amp; CODE DUMP

&lt;https://hardwear.io/germany-2021/training/ic-reverse-engineering-code-dump.php&gt;

COURSE DESCRIPTION:

Physical tampering techniques are composed of three main families from non-invasive (clock and VCC glitches, side channel analysis, etc) and semi-invasive (laser fault injection, photo-emission, etc) to fully-invasive methods requiring the use of equipments such as deprocessing tools, Scanning Electron Microscope, Focused Ion Beam, etc.The latter class is kno…</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/ipadlinux?rev=1764200760&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-11-26T23:46:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipadlinux</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/ipadlinux?rev=1764200760&amp;do=diff</link>
        <description>Linux on Ipad

	*  &lt;https://ipadlinux.org/&gt;
	*  &lt;https://nyansatan.github.io/run-unsupported-ios/&gt;</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/limesdr?rev=1681733616&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-04-17T12:13:36+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>limesdr</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/limesdr?rev=1681733616&amp;do=diff</link>
        <description>Lime SDR

	*  &lt;https://rs-ojict.pubpub.org/pub/lqhigiva/release/2&gt;</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/orbbecpersee?rev=1681665524&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-04-16T17:18:44+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>orbbecpersee</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/orbbecpersee?rev=1681665524&amp;do=diff</link>
        <description>Orbbec Devices

Persee

The Orbbec Persee is the world’s first camera-computer. This versatile, low-cost device can plug into your TV/monitor, or it can run without a display and you can interact with it entirely through the built-in Astra Pro 3D camera. Its ability to see, hear, and understand makes it much smarter than a regular computer. And its powerful built-in ARM processor makes it much more useful than single-use devices.</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/rfhackign?rev=1616357370&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-21T20:09:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rfhackign</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/rfhackign?rev=1616357370&amp;do=diff</link>
        <description>RF HACKING WITH SOFTWARE-DEFINED RADIO

&lt;https://hardwear.io/germany-2021/training/rf-hacking-with-software-defined-radio.php&gt;

COURSE DESCRIPTION:

In this 3-day training, students will learn about Software-Defined Radio applied against physical intrusion systems (alarms, intercoms, various remotes, etc.). This course provides basics, survival reflexes when testing real-world radio devices, and methods to go further. Compared to other courses that teach how to use public tools, this class is mo…</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/snickerdoodle?rev=1681663141&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-04-16T16:39:01+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>snickerdoodle</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/snickerdoodle?rev=1681663141&amp;do=diff</link>
        <description>Snicker Doodle

The workhorse behind snickerdoodle is an ARM-based System on Chip (SoC) from Xilinx called “Zynq.”

These powerful little chips - which have roots in industrial, aerospace, and defense applications - allow hardware to be reconfigured with software, freeing you to accomplish things that simply aren’t possible with regular microprocessors (like those in the Raspberry Pi and Beaglebone - which have roots in DVRs and cell phones).</description>
    </item>
    <item rdf:about="https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/tuyadevices?rev=1733861518&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-10T20:11:58+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tuyadevices</title>
        <link>https://wiki.unloquer.org/personas/brolin/proyectos/hardwarehacking/tuyadevices?rev=1733861518&amp;do=diff</link>
        <description>Tuya devices

Las aspiradoras son marca Tikom referencia L9000 (disponemos de 2)
- Amazon: &lt;https://a.co/d/7n2FkuO&gt;
- ⁠Página oficial: &lt;https://www.tikom.cc/case_show.asp?id=2030&gt;

Se maneja usando la aplicación Tuya Smart - una All-in-one para manejar dispositivos inteligentes de muchas marcas
- Sitio oficial: &lt;https://www.tuya.com/product/app-management/all-in-one-app&gt;
- ⁠App para Android:</description>
    </item>
</rdf:RDF>
