MouseJack device discovery and research tools
☆1,367Dec 19, 2017Updated 8 years ago
Alternatives and similar repositories for mousejack
Users that are interested in mousejack are comparing it to the libraries listed below
Sorting:
- JackIt - Exploit Code for Mousejack☆888Oct 1, 2020Updated 5 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆434Jul 24, 2022Updated 3 years ago
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆107Jul 27, 2016Updated 9 years ago
- KeySniffer device discovery tools and public advisories☆119Jul 26, 2016Updated 9 years ago
- Mousejack for ATmega32u4☆240Jun 9, 2023Updated 2 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Jul 10, 2016Updated 9 years ago
- Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.☆729Jan 2, 2024Updated 2 years ago
- GNU Radio module and Wireshark dissector for the Nordic Semiconductor nRF24L Enhanced Shockburst protocol.☆121Sep 3, 2022Updated 3 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,784Jul 27, 2024Updated last year
- Slides and code from "So You Want to Hack Radios", as presented by @marcnewlin and @matt-knight at ShmooCon 2017.☆75Sep 15, 2017Updated 8 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,353Aug 12, 2024Updated last year
- CableTap public disclosure documents.☆78Jul 29, 2017Updated 8 years ago
- IEEE 802.15.4/ZigBee Security Research Toolkit☆832Sep 12, 2023Updated 2 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆869Aug 4, 2017Updated 8 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,864Jun 28, 2024Updated last year
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,097Aug 21, 2018Updated 7 years ago
- RfCat - swiss-army knife of ISM band radio☆613Jul 28, 2024Updated last year
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆162Jul 22, 2021Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,900Jan 24, 2024Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- ☆106Feb 2, 2016Updated 10 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,120Mar 2, 2017Updated 9 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- My musings with PowerShell☆2,704Nov 19, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- 📡 On-off keying tools for your SD-arrrR☆143Feb 25, 2023Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,838Jun 15, 2020Updated 5 years ago
- ☆131Jan 15, 2020Updated 6 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,217Aug 2, 2024Updated last year
- This program show you IMSI numbers of cellphones around you.☆3,785Dec 30, 2025Updated 2 months ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Sep 22, 2023Updated 2 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,252Dec 19, 2025Updated 2 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,263Dec 18, 2021Updated 4 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,153Apr 18, 2020Updated 5 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago