4d4c / USBNinjaLinks
Guide for USBNinja
☆46Updated 6 years ago
Alternatives and similar repositories for USBNinja
Users that are interested in USBNinja are comparing it to the libraries listed below
Sorting:
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆27Updated 8 months ago
- karma WiFi attack implementation☆49Updated 7 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated 4 months ago
- LSTAR - CobaltStrike Translated to EN☆15Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- BLE based C2 for Hak5's Bash Bunny☆16Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- hiding in plain sight: part 2☆45Updated 10 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- GitHub CVE Repository Hunt☆18Updated 10 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Useful collection of scapy-scripts and more☆27Updated 11 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- ☆19Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated last year
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Python, C++ and Go☆22Updated 2 years ago