USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices
☆38Nov 26, 2024Updated last year
Alternatives and similar repositories for USB-Injection
Users that are interested in USB-Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 9 months ago
- USB testing made easy☆122May 22, 2023Updated 2 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago
- Apple PCC research☆17Mar 14, 2025Updated last year
- ☆23Jun 17, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- support code for the Bugblat USB sniffers☆16Jun 8, 2021Updated 4 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Utilities for sniffing bluetooth low-energy (BLE) packets using a CC2540 USB sniffer dongle☆28Jul 8, 2020Updated 5 years ago
- System Call Integrity Layer - experimental security research☆27Apr 14, 2026Updated last month
- ☆16Jun 23, 2024Updated last year
- Hackmelock Android application☆17Apr 11, 2017Updated 9 years ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- Entity-Relation Diagram Assisted Hacking Tool☆61Mar 7, 2026Updated 2 months ago
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 7 months ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- 蓝牙安全检测项目☆10Jan 31, 2023Updated 3 years ago
- some scripts to get imsi with gsm☆16Aug 23, 2016Updated 9 years ago
- USB MitM Wifi keylogger with keyboard and mouse injection capabilities☆64Jan 8, 2020Updated 6 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆35Jun 9, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Apr 14, 2026Updated last month
- ☆29Sep 14, 2022Updated 3 years ago
- Tools for dumping a parallel flash chip via an ESP32 and MCP23017 ICs☆29Dec 5, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generic exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)☆41Aug 15, 2023Updated 2 years ago
- 🐲 separate user on windows + firejail on linux + sandbox-exec on macOS☆22Feb 21, 2026Updated 3 months ago
- Hackmelock emulator device using node.js bleno☆27Sep 21, 2017Updated 8 years ago
- Fuzzing the COVESA/vsomeip library with AFL++☆22Apr 20, 2022Updated 4 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆17Dec 6, 2023Updated 2 years ago
- Identify JTAG ports using your favorite Arduino.☆82Dec 12, 2022Updated 3 years ago
- ☆17Mar 8, 2024Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- ☆14Oct 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Towards Universal Fuzzing of IoT Protocols.☆102Jul 4, 2025Updated 10 months ago
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago
- Documentación sobre sistemas embebidos☆13Nov 15, 2024Updated last year
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 5 months ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year