LetMeHID is a tool that generates Windows HID payloads to obtain bind or reverse access using Raspberry PI0 and P4wnP1 A.L.O.A.
☆53May 4, 2020Updated 5 years ago
Alternatives and similar repositories for LetMeHID
Users that are interested in LetMeHID are comparing it to the libraries listed below
Sorting:
- share of my personnal payloads for P4wnP1 A.L.O.A☆70Feb 19, 2019Updated 7 years ago
- payloads for P4wnP1 A.L.O.A☆81Feb 20, 2019Updated 7 years ago
- This repo is dedicated to P4wnP1 A.L.O.A by @MaMe82 Payloads☆47Oct 4, 2020Updated 5 years ago
- payloads for P4wnP1 A.L.O.A☆469Dec 31, 2025Updated 2 months ago
- 🕹️ Enter a command with OLED Joystick ▶️ Run + Display output on OLED Screen (Works with P4wnP1!)☆18Dec 23, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 3 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- ☆37Jun 16, 2019Updated 6 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking…☆11Aug 23, 2020Updated 5 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- CVE-2023-2640 CVE-2023-32629☆13Aug 15, 2023Updated 2 years ago
- A frida based hooking framework for android devices used mainly for app research☆14Mar 25, 2018Updated 7 years ago
- A swiss army knife tool for running, injecting and organizing your BOFs collection☆73Feb 20, 2026Updated last week
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆12Aug 27, 2022Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆4,293Oct 26, 2023Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆20Mar 21, 2024Updated last year
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆19Dec 14, 2019Updated 6 years ago
- ☆129Mar 1, 2023Updated 3 years ago
- on the road P4wnP1 ALOA menu☆159Jul 2, 2020Updated 5 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆26May 6, 2025Updated 9 months ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago