DarkMetalMouse / razerduino
☆48Updated last year
Alternatives and similar repositories for razerduino:
Users that are interested in razerduino are comparing it to the libraries listed below
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆140Updated 3 years ago
- ☆10Updated 7 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- repository containing some nmap scripts☆14Updated 4 years ago
- Hackable Windows SandBox environment☆31Updated 2 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- ☆26Updated 3 years ago
- A collection of random scripts in various languages☆29Updated 5 years ago
- A list of windows potatoes!☆25Updated 3 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Multiplatform Telegram Bot in pure PowerShell☆52Updated 2 years ago
- Silly proof-of-concept for a PDF chatroom☆21Updated 2 years ago
- Beautify Nessus scan output☆11Updated last year
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- An uploader honeypot designed to look like poor website security.☆28Updated 3 weeks ago
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes☆50Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Fork from @rsmudge/armitage☆33Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆42Updated 2 years ago
- Use md5-collisions to make evil executables looking like a good one.☆29Updated 5 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 7 months ago
- ☆11Updated 3 years ago
- Demo☆24Updated 5 years ago