A framework to kickstart yourself in making malicious USB devices using ATTiny85.
☆14Jun 11, 2025Updated 8 months ago
Alternatives and similar repositories for BadUSB
Users that are interested in BadUSB are comparing it to the libraries listed below
Sorting:
- The ultimate phishing tool with 38 websites available!☆14Nov 7, 2024Updated last year
- VPhoneOS: The Ultimate Virtual Machine for Android Devices☆22Jul 28, 2025Updated 7 months ago
- Files related to the microcontroller-remote app☆10Sep 3, 2023Updated 2 years ago
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Terminal with voice AI and banner☆13Jul 29, 2025Updated 7 months ago
- ☆14Dec 9, 2025Updated 2 months ago
- Custom firmware for RS97, LDK and RG300 consoles☆11Apr 14, 2023Updated 2 years ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- ☆15Sep 2, 2024Updated last year
- ☆14Updated this week
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- ☆12Jul 5, 2023Updated 2 years ago
- A web crawler in PHP☆12Aug 16, 2018Updated 7 years ago
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- ☆12Aug 22, 2017Updated 8 years ago
- Close-to-mainline fork with MT6765 patches (CAUTION: FORCE PUSHES)☆13Jul 18, 2024Updated last year
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 11 months ago
- Transform your movie nights into a cinematic experience with PlaySho, an Android app built with Kotlin! Collaborate with friends to watch…☆12Jul 2, 2024Updated last year
- Implementation of Lenstra-Lenstra-Lovász lattice basis reduction algorithm in Rust☆14Feb 24, 2022Updated 4 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- BadUSB - Intercept TCP traffic via USB Armory☆15Sep 7, 2016Updated 9 years ago
- Work-in-progress tool to dump Swift types from a Mach-o☆12Sep 24, 2024Updated last year
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- ☆17Jul 23, 2025Updated 7 months ago
- A Magisk/KSU module that unlocks 90 FPS and higher in BGMI, PUBG, and other games, delivering smoother gameplay even on low-end devices.☆23Nov 30, 2025Updated 3 months ago
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- my ctf chals☆11Jul 7, 2025Updated 7 months ago
- ARP断网攻击☆11Jun 25, 2023Updated 2 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- The files for my Solder Sustainer v2 project! Check it out at www.roboticworx.io!☆14Jan 8, 2025Updated last year
- HackerBot 3D printer☆18May 20, 2016Updated 9 years ago
- C2 Server for pentesting, exploitation, and payload creation☆12Jul 17, 2024Updated last year
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆16Oct 8, 2025Updated 4 months ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year