Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.
☆729Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for LOGITacker
Users that are interested in LOGITacker are comparing it to the libraries listed below
Sorting:
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆162Jul 22, 2021Updated 4 years ago
- ☆131Jan 15, 2020Updated 6 years ago
- ☆32Jul 15, 2019Updated 6 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆434Jul 24, 2022Updated 3 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Sep 22, 2023Updated 2 years ago
- ☆47Dec 6, 2019Updated 6 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,784Jul 27, 2024Updated last year
- MouseJack device discovery and research tools☆1,367Dec 19, 2017Updated 8 years ago
- JackIt - Exploit Code for Mousejack☆888Oct 1, 2020Updated 5 years ago
- Mousejack for ATmega32u4☆240Jun 9, 2023Updated 2 years ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆4,293Oct 26, 2023Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Nov 18, 2019Updated 6 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆23Jan 15, 2019Updated 7 years ago
- A sniffer for Bluetooth 5 and 4.x LE☆1,092Sep 25, 2025Updated 5 months ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,353Aug 12, 2024Updated last year
- BadUSB cable project☆407Aug 7, 2024Updated last year
- A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into…☆558Jan 4, 2023Updated 3 years ago
- WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, …☆596Jun 10, 2020Updated 5 years ago
- KeySniffer device discovery tools and public advisories☆119Jul 26, 2016Updated 9 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- Bluetooth Low Energy Swiss-army knife☆2,078Aug 4, 2024Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆67Jun 23, 2022Updated 3 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆19Aug 28, 2021Updated 4 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Crack and decrypt BLE encryption☆948Aug 26, 2021Updated 4 years ago
- Iceman Fork - Proxmark3☆5,257Updated this week
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Evil client portion of EAP relay attack☆213Jul 5, 2023Updated 2 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- ☆16Dec 17, 2022Updated 3 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- An Android app that lets you use your access control card cloning devices in the field.☆484Jul 27, 2019Updated 6 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆310Apr 13, 2025Updated 10 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,353Jan 26, 2026Updated last month
- ☆616May 27, 2020Updated 5 years ago