BadUSB - Intercept TCP traffic via USB Armory
☆15Sep 7, 2016Updated 9 years ago
Alternatives and similar repositories for badusb
Users that are interested in badusb are comparing it to the libraries listed below
Sorting:
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Implementation of BadUSB written in Python☆35Oct 4, 2017Updated 8 years ago
- Wifi enabled USB backdoor☆42Nov 13, 2016Updated 9 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Jul 26, 2011Updated 14 years ago
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆31Nov 1, 2021Updated 4 years ago
- Bad USB collections with malicious firmware☆75Jan 10, 2015Updated 11 years ago
- Code for the UAV payload☆10Jun 16, 2017Updated 8 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- A small status bar app, which shows a month calendar when clicking on the status bar icon☆11Aug 24, 2015Updated 10 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- Expanded version of the Espressif ESP webcam☆15Oct 7, 2020Updated 5 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- This GitHub repository provides users with a collection of links to trackable aircraft for any websites running a tar1090. This includes …☆14Jul 22, 2025Updated 7 months ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- A web-based matchmaking system for CS:GO☆13Aug 27, 2014Updated 11 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Instrument to capture RSSI and data of 433MHz transmissions☆12Sep 5, 2020Updated 5 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- A just example of net sniffiring using dll hijaking in Cossacks 3 game☆11Dec 31, 2016Updated 9 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- Generic UIView - similar to a gesture recognizer - which recognizes single finger rotation around the center point, and includes decelera…☆42Jun 4, 2015Updated 10 years ago
- Enter the target number and run the script. The target will receive a phone call every 3 seconds.☆14Jun 24, 2017Updated 8 years ago
- clone mifare card based on arduino uno☆11May 23, 2017Updated 8 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago