insecurityofthings / jackitLinks
JackIt - Exploit Code for Mousejack
☆852Updated 4 years ago
Alternatives and similar repositories for jackit
Users that are interested in jackit are comparing it to the libraries listed below
Sorting:
- MouseJack device discovery and research tools☆1,346Updated 7 years ago
- Mousejack for ATmega32u4☆217Updated 2 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,728Updated 11 months ago
- Run Hak5 Bash Bunny scripts on a raspbery pi☆238Updated 8 years ago
- ☆368Updated last year
- SensePost's modified hostapd for wifi attacks.☆570Updated 10 months ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆861Updated 7 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, …☆578Updated 5 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆497Updated 7 years ago
- caplets and proxy modules.☆502Updated 3 months ago
- The Official WiFi Pineapple Module Repository for the NANO & TETRA☆481Updated 2 years ago
- Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.☆711Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,323Updated 9 months ago
- The Official Packet Squirrel Payload Repository☆458Updated 4 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,107Updated 7 years ago
- Encoding Tools for Rubber Ducky☆435Updated last year
- Converter for raw RubberDucky payloads to Digispark Arduino IDE Sketch source.☆487Updated 6 years ago
- A Software Defined Radio Attack Tool☆540Updated 5 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,743Updated 5 months ago
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,426Updated 2 years ago
- Simple DuckyScript to Arduino C converter.☆366Updated 3 years ago
- Rubber Ducky compatible clone based on CJMCU BadUSB HW.☆291Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,284Updated 3 years ago
- Modified hostapd to facilitate AP impersonation attacks☆512Updated 7 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆258Updated last year
- An Android app that lets you use your access control card cloning devices in the field.☆462Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,216Updated 4 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆550Updated 8 years ago