SySS-Research / radio-hackboxLinks
PoC tool to demonstrate vulnerabilities in wireless input devices
☆87Updated 8 years ago
Alternatives and similar repositories for radio-hackbox
Users that are interested in radio-hackbox are comparing it to the libraries listed below
Sorting:
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆146Updated 8 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆88Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆114Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆58Updated 6 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Updated 9 years ago
- Porting the Pineapple to the Raspberry Pi☆84Updated 12 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆87Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).☆120Updated 6 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆137Updated 9 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆158Updated 5 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 6 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- Powershell Reverse Rubber Ducky☆56Updated 10 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- new WPS attack tool☆55Updated 10 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆145Updated 10 years ago
- ☆84Updated 7 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- HID attack payload generator for Arduinos☆165Updated last year
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago