RedBalloonShenanigans / MonitorDarkly
Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.
☆912Updated 7 years ago
Alternatives and similar repositories for MonitorDarkly:
Users that are interested in MonitorDarkly are comparing it to the libraries listed below
- ☆1,331Updated last year
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,096Updated 6 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆677Updated 2 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,409Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,668Updated 5 years ago
- The USG is Good, not Bad☆404Updated 5 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,840Updated 9 months ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,009Updated 9 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆831Updated 4 years ago
- Various PoCs☆491Updated 5 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated 2 months ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,092Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,596Updated 4 years ago
- A web front-end for password cracking and analytics☆625Updated 3 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- SSH man-in-the-middle tool☆1,657Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Snoopy: A distributed tracking and data interception framework☆601Updated 12 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,694Updated 3 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆654Updated 4 months ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆241Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,025Updated 5 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- Brand New Code Injection for Windows☆729Updated 4 years ago
- This project has been moved to:☆1,461Updated 4 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆302Updated 3 years ago
- Hardware backdoors in some x86 CPUs☆2,363Updated 6 years ago