Bad USB collections with malicious firmware
☆75Jan 10, 2015Updated 11 years ago
Alternatives and similar repositories for badusb
Users that are interested in badusb are comparing it to the libraries listed below
Sorting:
- Wifi enabled USB backdoor☆42Nov 13, 2016Updated 9 years ago
- BadUSB - Intercept TCP traffic via USB Armory☆15Sep 7, 2016Updated 9 years ago
- Implementation of BadUSB written in Python☆35Oct 4, 2017Updated 8 years ago
- a proof of concept badUSB attack which install a apk on Android☆140Nov 17, 2019Updated 6 years ago
- Turn ordinary USB drives into Bad USBs☆52Sep 18, 2017Updated 8 years ago
- BadUSB DigiSpark sketches and Powershell Scripts☆37Jun 19, 2019Updated 6 years ago
- Personal implementation of the BadUSB exploit with an Atmel 8-bit AVR ATTiny85 acting as a HID keyboard☆70Nov 7, 2020Updated 5 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆68Oct 1, 2017Updated 8 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Feb 27, 2014Updated 12 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- A custom coprocessor and SoC for hardware security experiments in electronics.☆12May 20, 2017Updated 8 years ago
- ☆12May 3, 2017Updated 8 years ago
- USB device management to prevent against BadUSB attacks☆24Oct 4, 2014Updated 11 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Arduino based hardware serial sniffer☆17Aug 23, 2017Updated 8 years ago
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆31Nov 1, 2021Updated 4 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 3 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Jun 22, 2016Updated 9 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- iCEstick iCE40-HX1K FPGA hacks ~ iCEfm FM Transmitter☆18Nov 24, 2025Updated 3 months ago
- This Project uses a Panda board mounted on top of my drone (the attacker) to hijack other drones autonomously and fly them back to the st…☆16May 20, 2014Updated 11 years ago
- SPI flash MITM and emulation (QSPI is a WIP)☆20Jan 27, 2022Updated 4 years ago
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- BadUSB Script Converter☆45Jul 12, 2025Updated 7 months ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Nov 20, 2018Updated 7 years ago
- An implementation of the concepts behind the Logjam attack☆16May 1, 2016Updated 9 years ago
- ☆22Jun 1, 2024Updated last year
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago