A framework to kickstart yourself in making malicious USB devices using ATTiny85.
☆14Jun 11, 2025Updated 10 months ago
Alternatives and similar repositories for BadUSB
Users that are interested in BadUSB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- BadUSB - Intercept TCP traffic via USB Armory☆15Sep 7, 2016Updated 9 years ago
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- cool stuff hehe☆16Feb 22, 2024Updated 2 years ago
- Use to download Twinkle Star Knights X (ティンクルスターナイツX) resources☆20Jan 5, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DIY bad USB [shellcode injector] using arduino [AVR family microcontrollers] to exploit windows targets.☆16Aug 17, 2015Updated 10 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- ☆21Mar 14, 2023Updated 3 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- This repository is dedicated to bad USB payloads.☆23Sep 16, 2024Updated last year
- Use to download all King of Kinks resources without actually play the game and decrypt files☆23Feb 23, 2023Updated 3 years ago
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- My mobile writeups repository☆29Nov 19, 2025Updated 4 months ago
- Please use the new one https://github.com/myssal/Reverse1999CN☆24May 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C2 Server for pentesting, exploitation, and payload creation☆13Jul 17, 2024Updated last year
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- 用於下載與解密 櫻境物語 (Use to download all CherryTale resources and decrypt files)☆22Jan 28, 2026Updated 2 months ago
- ☆25Apr 29, 2025Updated 11 months ago
- Collections of web event spines made by HoYo☆27Nov 16, 2024Updated last year
- 用於解密 未來戰 (Use to decrypt Counter:Side *.asset file)[2023ver.]☆30Jan 28, 2026Updated 2 months ago
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆32Nov 1, 2021Updated 4 years ago
- Any img file extract dtb convert to dts after edit pack to original file!☆24Feb 1, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Make your own BadUSB device!☆33Nov 28, 2017Updated 8 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆40Feb 28, 2018Updated 8 years ago
- Implementation of BadUSB written in Python☆36Oct 4, 2017Updated 8 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- Files related to the microcontroller-remote app☆11Sep 3, 2023Updated 2 years ago
- ☆14Feb 27, 2026Updated last month
- Close-to-mainline fork with MT6765 patches (CAUTION: FORCE PUSHES)☆15Jul 18, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- 用于获取u3d游戏的dump.cs☆16Mar 28, 2026Updated 2 weeks ago
- A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets pos…☆42Sep 18, 2025Updated 6 months ago
- The builds scripts and packages that build everything in the KBOX distribution☆31May 30, 2017Updated 8 years ago
- VPhoneOS: The Ultimate Virtual Machine for Android Devices☆31Jul 28, 2025Updated 8 months ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆17Sep 14, 2020Updated 5 years ago
- ☆20Feb 1, 2026Updated 2 months ago