A framework to kickstart yourself in making malicious USB devices using ATTiny85.
☆14Jun 11, 2025Updated 11 months ago
Alternatives and similar repositories for BadUSB
Users that are interested in BadUSB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive subdomains and web directories recon using Bing.☆14Apr 30, 2018Updated 8 years ago
- BadUSB - Intercept TCP traffic via USB Armory☆15Sep 7, 2016Updated 9 years ago
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- cool stuff hehe☆16Feb 22, 2024Updated 2 years ago
- Use to download Twinkle Star Knights X (ティンクルスターナイツX) resources☆22Jan 5, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- DIY bad USB [shellcode injector] using arduino [AVR family microcontrollers] to exploit windows targets.☆16Aug 17, 2015Updated 10 years ago
- ☆21Mar 14, 2023Updated 3 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- This repository is dedicated to bad USB payloads.☆22Sep 16, 2024Updated last year
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- Please use the new one https://github.com/myssal/Reverse1999CN☆24May 5, 2024Updated 2 years ago
- My mobile writeups repository☆33Nov 19, 2025Updated 6 months ago
- Use to download all King of Kinks resources without actually play the game and decrypt files☆24Feb 23, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- C2 Server for pentesting, exploitation, and payload creation☆13Jul 17, 2024Updated last year
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 5 years ago
- 用於下載與解密 櫻境物語 (Use to download all CherryTale resources and decrypt files)☆25Jan 28, 2026Updated 3 months ago
- ☆25Apr 29, 2025Updated last year
- Archived, successor: c2t-r/hyv-spine2d☆27Apr 27, 2026Updated 3 weeks ago
- 用於解密 未來戰 (Use to decrypt Counter:Side *.asset file)[2023ver.]☆34Jan 28, 2026Updated 3 months ago
- Any img file extract dtb convert to dts after edit pack to original file!☆25Feb 1, 2024Updated 2 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆32Nov 1, 2021Updated 4 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Make your own BadUSB device!☆33Nov 28, 2017Updated 8 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆40Feb 28, 2018Updated 8 years ago
- Implementation of BadUSB written in Python☆36Oct 4, 2017Updated 8 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- Files related to the microcontroller-remote app☆11Sep 3, 2023Updated 2 years ago
- Close-to-mainline fork with MT6765 patches (CAUTION: FORCE PUSHES)☆14Jul 18, 2024Updated last year
- ☆14Feb 27, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- 用于获取u3d游戏的dump.cs☆19May 13, 2026Updated last week
- The builds scripts and packages that build everything in the KBOX distribution☆31May 30, 2017Updated 8 years ago
- VPhoneOS: The Ultimate Virtual Machine for Android Devices☆32Jul 28, 2025Updated 9 months ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆18Sep 14, 2020Updated 5 years ago
- ☆20Feb 1, 2026Updated 3 months ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago