SPRITZ-Research-Group / Skype-Type
Don't Skype & Type! Keyboard acoustic eavesdropping tool.
☆319Updated 6 years ago
Alternatives and similar repositories for Skype-Type:
Users that are interested in Skype-Type are comparing it to the libraries listed below
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆580Updated 7 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Various Tools and Docker Images☆280Updated 6 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Various PoCs☆491Updated 5 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,096Updated 6 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- a grep -r for secrets☆179Updated 2 years ago
- ☆352Updated 3 years ago
- Wolves Among the Sheep☆147Updated last year
- Fancy Bear Source Code☆261Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆230Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆320Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- A webshell framework for penetration testers.☆297Updated last year
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Malicious USB☆171Updated last year
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Nameserver DNS poisoning attacks made easy☆520Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year