An attacker-oriented library for the Teensy 3.1 microcontroller.
☆44Jan 11, 2015Updated 11 years ago
Alternatives and similar repositories for Paensy
Users that are interested in Paensy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Arduino code and Odroid-C1 (or Raspberry PI) python code to control TI cc1100 and cc1101 transceivers. Also known as: RF1100SE and RF110…☆13Feb 28, 2017Updated 9 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆870Aug 4, 2017Updated 8 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15Feb 11, 2015Updated 11 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- ☆14Feb 4, 2019Updated 7 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 11 years ago
- Python simulation of "rolljam" attacks☆18Jul 29, 2022Updated 3 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆18Aug 30, 2015Updated 10 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Build your own Bad USB Stick for pentesting with wifi and dip switches☆43Dec 3, 2016Updated 9 years ago
- 433.92MHz OOK modulated frame replaying device☆34Jul 13, 2015Updated 10 years ago
- keyfob rx☆25Mar 30, 2011Updated 14 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- Windows Installation Diff Tool☆10Jun 24, 2016Updated 9 years ago