The power-analysis and fault-injection tool you can hold in your paw
A USB kill cord for your laptop
An open source, privacy friendly, compact GNSS receiver with ESP32 and NFC for all your location based projects, including tracking surveillance cameras
A one-chip hardware security module (HSM) and MAX10 FPGA dev board
A multi-tool for building, analyzing, and hacking USB devices
A compact, easy-to-use, low-power, bidirectional, thermal-detection sensor that respects privacy
Security-oriented mini-ITX motherboard with MCST Elbrus8CB VLIW as CPU
A tiny, open source USB computer for security applications
Mobile, Open Hardware, RISC-V System-on-Chip (SoC) Development Kit
A mind-bending hardware puzzle in three acts
Security keys you create by rolling dice
A tiny FIDO2 security key for two-factor authentication and passwordless login
A hardware-based USB 2.0 monitor & trigger platform, controlled from Python
An all-in-one encrypted USB flash drive, two-factor authentication token, and password manager
A handheld RFID & NFC test instrument optimized for untethered use in the field
BadUSB embedded into a USB cable
Open hardware USB true random number generator
A tool to explore optical data transmissions and covert channels
Physical security for your personal data
An open source USB stick computer for security applications.
Open-source hardware password manager
An open source, physically secure personal computer.
An Earth-friendly way to easily upgrade and fix your own computer
An independent international development effort founded to create a trusted, open source, inexpensive, hardware cryptographic engine.
An open, programmable dongle for protecting USB devices from USB hosts and chargers.
Your Personal, Portable Password Manager
The first high-end laptop that respects your privacy, security, and freedom
Protect your USB Armory Mk I in style with this milled PaperStone and anodized aluminum enclosure.
The first high-end laptop that respects your freedom and privacy
A protective barrier between your device and "juice-jacking" hackers.