Teensy code to brute force a keylogger's unlock code
☆15Sep 5, 2016Updated 9 years ago
Alternatives and similar repositories for usb-keylog-crack
Users that are interested in usb-keylog-crack are comparing it to the libraries listed below
Sorting:
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 9 years ago
- ARP poison and sniff with DNS spoofing, urlsnarf, driftnet, ferret, dsniff, sslstrip and tcpdump☆25Jan 12, 2015Updated 11 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- 😈 Hardware USB keylogger project with Arduino.☆17Feb 2, 2017Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Tools and scripts fro esp8266☆33Mar 25, 2018Updated 7 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- for Google Apps Script HtmlService. Set and get a data object on an htmlOutput☆10Mar 4, 2017Updated 8 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Sep 28, 2015Updated 10 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- ☆14Feb 20, 2022Updated 4 years ago
- Application using libopenikev2 and libopenikev2_impl libraries. It has a similar behaviour than others IKEv2 daemons, like racoon2 or ike…☆11Mar 19, 2020Updated 5 years ago
- hoeks.ma Location☆10Jun 12, 2017Updated 8 years ago