Malicious USB
☆176Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for malusb
Users that are interested in malusb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A multiplatform spyware with many features.☆13Sep 24, 2021Updated 4 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 9 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆104Jan 18, 2017Updated 9 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆87Apr 21, 2017Updated 9 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆872Aug 4, 2017Updated 8 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- One-off scripts☆53Sep 4, 2017Updated 8 years ago
- ☆239Oct 8, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- P4wnP1 - WiFi covert channel - Client agent (experimental Proof of Concept) by MaMe82☆85Apr 2, 2018Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,795Jul 27, 2024Updated last year
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆66Jun 5, 2018Updated 7 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- WarBerryPi - Tactical Exploitation☆2,221Nov 9, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆295Jun 27, 2017Updated 8 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆945May 8, 2019Updated 6 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆410Jul 14, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- A library of pretexts to use on offensive phishing engagements.☆391Aug 9, 2019Updated 6 years ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆88Mar 24, 2017Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆290Jun 22, 2016Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago