4d4c / USBNinja
Guide for USBNinja
☆44Updated 5 years ago
Alternatives and similar repositories for USBNinja:
Users that are interested in USBNinja are comparing it to the libraries listed below
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- Modular framework to exploit UPS devices☆63Updated last year
- VLAN ID Parser☆6Updated 9 months ago
- karma WiFi attack implementation☆48Updated 4 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- ☆24Updated last year
- exfiltration/infiltration toolkit☆44Updated 3 months ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 10 months ago
- ☆16Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated 10 months ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆19Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆15Updated last year
- Our fork of Iceman's fork for Proxmark III☆15Updated 2 months ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- ☆19Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆33Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year