DarkMetalMouse / razerduino
☆48Updated last year
Alternatives and similar repositories for razerduino:
Users that are interested in razerduino are comparing it to the libraries listed below
- ☆10Updated 7 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated last year
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- An uploader honeypot designed to look like poor website security.☆28Updated 4 months ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- ☆27Updated 3 years ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆140Updated 3 years ago
- Scans the filesystem for directories that are user-writeable☆11Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- Hackable Windows SandBox environment☆31Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 6 months ago
- Fork from @rsmudge/armitage☆33Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆28Updated this week
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- ☆39Updated 11 months ago
- Source code and examples for Antignis☆38Updated 2 years ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆15Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- ☆14Updated 4 years ago
- Multiplatform Telegram Bot in pure PowerShell☆52Updated 2 years ago
- A simple yet beautiful phishing proxy.☆53Updated 3 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago