DarkMetalMouse / razerduinoLinks
☆47Updated 2 years ago
Alternatives and similar repositories for razerduino
Users that are interested in razerduino are comparing it to the libraries listed below
Sorting:
- Hackable Windows SandBox environment☆32Updated 2 years ago
- Check if your provider is blocking you!☆104Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated 2 years ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆148Updated 4 years ago
- A collection of random scripts in various languages☆33Updated 6 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆123Updated 2 years ago
- vt-use-cases☆18Updated 2 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆26Updated 3 years ago
- Simple Go Discord Bot☆23Updated 2 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- ☆28Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆38Updated last week
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- brute force SSH public-key authentication☆78Updated 8 months ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- ☆10Updated 8 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- ☆70Updated 5 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆46Updated 3 years ago
- Fork from @rsmudge/armitage☆34Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago
- Immediate Virus Infection Counter Measures☆63Updated 4 years ago
- ☆81Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated 2 years ago