MG community edition is an open source pentesting tool to generate payloads for HID attacks.
☆18Jan 3, 2018Updated 8 years ago
Alternatives and similar repositories for MG
Users that are interested in MG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project aims to convert your Pinephone into a Rubber Ducky (hid gadget)☆14Feb 20, 2022Updated 4 years ago
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆13Jun 4, 2022Updated 3 years ago
- This Project uses a Panda board mounted on top of my drone (the attacker) to hijack other drones autonomously and fly them back to the st…☆17May 20, 2014Updated 12 years ago
- Simple Python3 port scanner☆16Dec 17, 2020Updated 5 years ago
- CC1101 Library for ESP32/ESP8266☆17Jul 14, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- USB controlled nRF24L01+ 2.4GHz Transceiver☆51Sep 1, 2025Updated 8 months ago
- A simple j1939 communication library for Arduino☆15Sep 19, 2025Updated 8 months ago
- Yet another device that monitors power, current, voltage, frequency, power factor, and energy. The live data is available on a screen or …☆16Oct 23, 2023Updated 2 years ago
- HID attack payload generator for Arduinos☆166Jul 8, 2024Updated last year
- Stock trading bot using Alpaca API☆14Jan 10, 2020Updated 6 years ago
- With this tool, you can register entries of the CC1101 during operation read and change. You can switch to send or receive. Set the trans…☆49Mar 23, 2021Updated 5 years ago
- Magnetic Pentesting tool for Raspberry Pi☆65Jul 6, 2020Updated 5 years ago
- Sending and receiving Simu: Radio motor Hz / Hz02 / EHz / Door control RSA / Radio receiver SA Hz / Garage door operator GM800 / GM1000 M…☆52Feb 15, 2021Updated 5 years ago
- ☆24Jan 25, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- Research done about modern hardware keyloggers☆46Feb 13, 2020Updated 6 years ago
- ☆12May 13, 2024Updated 2 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆17Jul 2, 2020Updated 5 years ago
- ☆12May 3, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 3 years ago
- MagTool is software for magnetic stripe readers & writers.☆14Jan 22, 2013Updated 13 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆12Feb 2, 2018Updated 8 years ago
- Hardware abstraction layer for HackRF software-defined radio☆14Feb 4, 2017Updated 9 years ago
- Discovery Header Bug Bounty to DoD☆49Aug 20, 2021Updated 4 years ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 10 years ago
- ☆11May 15, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆15Sep 16, 2020Updated 5 years ago
- A (massive) DNS tools (reverse lookup for now)☆12Jul 6, 2022Updated 3 years ago