!!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based Arduino HID Keyboard Emulator
☆49Jul 12, 2017Updated 8 years ago
Alternatives and similar repositories for github-ESPloit
Users that are interested in github-ESPloit are comparing it to the libraries listed below
Sorting:
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Dec 18, 2017Updated 8 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆37Feb 14, 2017Updated 9 years ago
- Open Source Hardware using an ESP-12 with CNLohr's USB implementation.☆33Apr 1, 2019Updated 6 years ago
- Boscloner - All in One RFID Cloning Toolkit☆16Apr 14, 2017Updated 8 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Open source PCB the size of a credit card that is capable of detecting the field generated by a RFID reader and identify if it is a LF(12…☆77May 31, 2018Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, …☆598Jun 10, 2020Updated 5 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- These are Arduino examples for many esp8266 devkits,such as D1 mini,D1 mini pro,nodemcu and so on.☆13May 24, 2017Updated 8 years ago
- ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)☆48May 16, 2017Updated 8 years ago
- A tool to whitelist USB devices to prevent data leaks☆15Jan 25, 2018Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- AVR based ISM transciever covering 260-960MHz☆19Apr 11, 2012Updated 13 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Docker image for rbanffy/vm370☆27Dec 30, 2025Updated 2 months ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆27Oct 30, 2020Updated 5 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- ☆14Oct 31, 2017Updated 8 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- Universal Radio Hacker (urh) plugin to decode cc1101 messages, which uses the cc1101 FEC (forward error correction) feature☆39Jun 8, 2017Updated 8 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- ☆20Mar 31, 2017Updated 8 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago