Bad USB collections with malicious firmware
☆75Jan 10, 2015Updated 11 years ago
Alternatives and similar repositories for badusb
Users that are interested in badusb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of BadUSB written in Python☆35Oct 4, 2017Updated 8 years ago
- a proof of concept badUSB attack which install a apk on Android☆141Nov 17, 2019Updated 6 years ago
- USB device management to prevent against BadUSB attacks☆24Oct 4, 2014Updated 11 years ago
- Turn ordinary USB drives into Bad USBs☆53Sep 18, 2017Updated 8 years ago
- Steal All Browser Credentials Via BasUSB Attack In 5 Seconds.☆63Apr 9, 2022Updated 3 years ago
- This repository is dedicated to bad USB payloads.☆23Sep 16, 2024Updated last year
- Simple code to execute payloads depending on the detected OS.☆33Jul 6, 2019Updated 6 years ago
- This script allows you to steal some informations from a computer.☆209Feb 8, 2025Updated last year
- ☆12May 3, 2017Updated 8 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆68Oct 1, 2017Updated 8 years ago
- This script allows you to take control of a PC with a reverseShell attack.☆57Jul 13, 2022Updated 3 years ago
- A framework which writes your Digispark arduino code for a specific metasploit payload.☆21Aug 24, 2021Updated 4 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Rabbit in Python☆12Mar 20, 2018Updated 8 years ago
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- This script allows you to disable Windows password in only 4 seconds.☆83Feb 8, 2025Updated last year
- ☆16Dec 9, 2018Updated 7 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- A custom coprocessor and SoC for hardware security experiments in electronics.☆12May 20, 2017Updated 8 years ago
- This is the code for the fault injection tutorial I wrote. Read the README for more information.☆13Feb 27, 2014Updated 12 years ago
- SPI flash MITM and emulation (QSPI is a WIP)☆20Jan 27, 2022Updated 4 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Some Malduino ducky scripts☆26May 22, 2017Updated 8 years ago
- iCEstick iCE40-HX1K FPGA hacks ~ iCEfm FM Transmitter☆18Nov 24, 2025Updated 3 months ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer e…☆28May 16, 2017Updated 8 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Homebrew tap for MinIO☆20Sep 7, 2025Updated 6 months ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Mar 5, 2014Updated 12 years ago
- Fork of Boomerang Decompiler (08-08-2011)☆33Jul 11, 2016Updated 9 years ago
- Currency Recognition On Mobile Phones☆13Jun 15, 2024Updated last year
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Code from Chris Valasek @nudehaberdasher and Charlie Miller @0xcharlie car hack: http://blog.ioactive.com/2013/08/car-hacking-content.ht…☆14Oct 1, 2020Updated 5 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- Network library implemented with C++23 standard☆10Jan 10, 2026Updated 2 months ago