A framework to kickstart yourself in making malicious USB devices using ATTiny85.
☆14Jun 11, 2025Updated 9 months ago
Alternatives and similar repositories for BadUSB
Users that are interested in BadUSB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- BadUSB - Intercept TCP traffic via USB Armory☆15Sep 7, 2016Updated 9 years ago
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- cool stuff hehe☆15Feb 22, 2024Updated 2 years ago
- Use to download Twinkle Star Knights X (ティンクルスターナイツX) resources☆19Jan 5, 2025Updated last year
- DIY bad USB [shellcode injector] using arduino [AVR family microcontrollers] to exploit windows targets.☆16Aug 17, 2015Updated 10 years ago
- ☆21Mar 14, 2023Updated 3 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- This repository is dedicated to bad USB payloads.☆23Sep 16, 2024Updated last year
- Use to download all King of Kinks resources without actually play the game and decrypt files☆23Feb 23, 2023Updated 3 years ago
- Learn how to intercept flutter apps☆23Jan 19, 2024Updated 2 years ago
- My mobile writeups repository☆27Nov 19, 2025Updated 4 months ago
- Please use the new one https://github.com/myssal/Reverse1999CN☆24May 5, 2024Updated last year
- C2 Server for pentesting, exploitation, and payload creation☆12Jul 17, 2024Updated last year
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- 用於下載與解密 櫻境物語 (Use to download all CherryTale resources and decrypt files)☆21Jan 28, 2026Updated last month
- ☆26Apr 29, 2025Updated 10 months ago
- Collections of web event spines made by HoYo☆27Nov 16, 2024Updated last year
- 用於解密 未來戰 (Use to decrypt Counter:Side *.asset file)[2023ver.]☆30Jan 28, 2026Updated last month
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆31Nov 1, 2021Updated 4 years ago
- Any img file extract dtb convert to dts after edit pack to original file!☆24Feb 1, 2024Updated 2 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Make your own BadUSB device!☆33Nov 28, 2017Updated 8 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆40Feb 28, 2018Updated 8 years ago
- Implementation of BadUSB written in Python☆35Oct 4, 2017Updated 8 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- Files related to the microcontroller-remote app☆11Sep 3, 2023Updated 2 years ago
- ☆14Feb 27, 2026Updated 3 weeks ago
- Close-to-mainline fork with MT6765 patches (CAUTION: FORCE PUSHES)☆13Jul 18, 2024Updated last year
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- 用于获取u3d游戏的dump.cs☆14Updated this week
- The builds scripts and packages that build everything in the KBOX distribution☆31May 30, 2017Updated 8 years ago
- VPhoneOS: The Ultimate Virtual Machine for Android Devices☆26Jul 28, 2025Updated 7 months ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆17Sep 14, 2020Updated 5 years ago
- A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets pos…☆42Sep 18, 2025Updated 6 months ago