brandonlw / PsychsonLinks
Phison 2251-03 (2303) Custom Firmware & Existing Firmware Patches (BadUSB)
☆4,173Updated 4 years ago
Alternatives and similar repositories for Psychson
Users that are interested in Psychson are comparing it to the libraries listed below
Sorting:
- MouseJack device discovery and research tools☆1,364Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,261Updated 9 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,260Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,781Updated last year
- Framework for Man-In-The-Middle attacks☆3,637Updated 7 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,118Updated 8 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,843Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Updated 7 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,434Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Updated 7 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,150Updated 5 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,457Updated last year
- 📡 A python program to create a fake AP and sniff data.☆1,691Updated 6 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,980Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆870Updated 8 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Updated 7 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,694Updated 2 years ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,144Updated 4 years ago
- Inject code and spy on wifi users☆2,615Updated 4 years ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,527Updated 6 years ago
- OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy☆878Updated 5 years ago
- ☆1,911Updated 3 months ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆592Updated 3 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,537Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Updated 5 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,344Updated last year
- Tool to analyze and test security in IPv4 and IPv6 data networks☆776Updated 10 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,214Updated last year
- Network Attack Tool☆1,491Updated 2 years ago
- The famous WPA precomputed cracker, Migrated from Google.☆1,117Updated last year