KernelEquinox / Teensyterpreter
A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.
☆103Updated 8 years ago
Alternatives and similar repositories for Teensyterpreter:
Users that are interested in Teensyterpreter are comparing it to the libraries listed below
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆60Updated 6 years ago
- Stargate☆94Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- HID attack payload generator for Arduinos☆162Updated 6 months ago
- Reliable Teensy Penetration Testing Payload☆177Updated 12 years ago
- Duct Tape Command and Control!☆94Updated 5 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆282Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆43Updated 10 years ago
- A software to make easier some cracking GSM steps (known plaintext attack vector) https://www.youtube.com/watch?v=QG2iIxv5smw☆117Updated last year
- Wiegotcha: Long Range RFID Thief☆229Updated 3 years ago
- KeySniffer device discovery tools and public advisories☆117Updated 8 years ago
- Malicious USB☆170Updated last year
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Porting the Pineapple to the Raspberry Pi☆83Updated 11 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- Distributed wrapper around oclHashcat☆88Updated 4 years ago
- ☆126Updated 9 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆137Updated 5 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆135Updated 8 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆140Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆258Updated 8 years ago