Malicious USB
☆176Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for malusb
Users that are interested in malusb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A multiplatform spyware with many features.☆13Sep 24, 2021Updated 4 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆104Jan 18, 2017Updated 9 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆871Aug 4, 2017Updated 8 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- ☆238Oct 8, 2020Updated 5 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,793Jul 27, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆66Jun 5, 2018Updated 7 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- WarBerryPi - Tactical Exploitation☆2,223Nov 9, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆294Jun 27, 2017Updated 8 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Jul 14, 2016Updated 9 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- A library of pretexts to use on offensive phishing engagements.☆391Aug 9, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆87Mar 24, 2017Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆290Jun 22, 2016Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆360Nov 21, 2017Updated 8 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Sep 12, 2018Updated 7 years ago