USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices
☆37Nov 26, 2024Updated last year
Alternatives and similar repositories for USB-Injection
Users that are interested in USB-Injection are comparing it to the libraries listed below
Sorting:
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- Apple PCC research☆16Mar 14, 2025Updated 11 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- some scripts to get imsi with gsm☆16Aug 23, 2016Updated 9 years ago
- ☆16Jun 23, 2024Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 5 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 6 months ago
- Hackmelock emulator device using node.js bleno☆27Sep 21, 2017Updated 8 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Tools for dumping a parallel flash chip via an ESP32 and MCP23017 ICs☆29Dec 5, 2019Updated 6 years ago
- Allow full file-system access over USB for all arm64 devices, especially useful for those on iOS 11 and above.☆21May 7, 2023Updated 2 years ago
- Screen eavesdrop in real time leveraging SDR and pure Julia implementation !☆28Updated this week
- ☆28Sep 14, 2022Updated 3 years ago
- 基于inotify的Linux文件实时监控程序,同时调用河马扫描来检测文件☆22Sep 4, 2020Updated 5 years ago
- An open-source Xilinx Kria SOM Carrier for high-speed camera design☆29Dec 25, 2023Updated 2 years ago
- Escape macOS Sandbox using sharedfilelistd exploit☆63Jun 28, 2025Updated 8 months ago
- Identify JTAG ports using your favorite Arduino.☆79Dec 12, 2022Updated 3 years ago
- USB MitM Wifi keylogger with keyboard and mouse injection capabilities☆63Jan 8, 2020Updated 6 years ago
- CPL remote trigger☆43Dec 28, 2025Updated 2 months ago
- TightVNC library for building Cobalt Strike.☆29Dec 14, 2018Updated 7 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- A MATLAB app to interactively navigate Ryze Tello drone, read navigation data, process image data and produce equivalent MATLAB code. Thi…☆13Oct 22, 2025Updated 4 months ago
- Visualize your touch interactions!☆28Dec 12, 2025Updated 2 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 8 months ago
- CVE-2024-44258☆89Nov 2, 2024Updated last year
- ☆137Jan 14, 2024Updated 2 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Import a Motor-CAD Thermal Model into Simulink and Simscape☆16Jul 22, 2025Updated 7 months ago
- JB ETA????☆28Feb 4, 2021Updated 5 years ago
- ☆10Nov 14, 2022Updated 3 years ago
- The multiplatform connector program for most robots supported by the Open Roberta Lab.☆13May 21, 2024Updated last year
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago