DarkMetalMouse / razerduinoLinks
☆47Updated last year
Alternatives and similar repositories for razerduino
Users that are interested in razerduino are comparing it to the libraries listed below
Sorting:
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆145Updated 4 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated 2 years ago
- ☆28Updated 4 years ago
- Fork from @rsmudge/armitage☆34Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- A collection of random scripts in various languages☆32Updated 6 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- Hackable Windows SandBox environment☆32Updated 2 years ago
- Collection of hashcat lists and things.☆51Updated 6 years ago
- ☆96Updated 3 months ago
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆123Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Simple WPA-PSK default password candidates generator for mobile broadband WIFI routers, based on IMEI☆48Updated 2 months ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 5 years ago
- vt-use-cases☆18Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆15Updated 2 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆41Updated last month
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated last year
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆99Updated 10 months ago