IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)
☆66Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for IRON-HID
Users that are interested in IRON-HID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Mar 22, 2015Updated 11 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆501Aug 11, 2017Updated 8 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Code for the Arduino for the Secret Agents book☆14Sep 12, 2015Updated 10 years ago
- CAROS yocto meta layer☆11Jun 23, 2017Updated 8 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆26May 17, 2015Updated 10 years ago
- A (very basic) steganographic device, for encoding a payload into an image☆24Sep 23, 2015Updated 10 years ago
- Python - Human Interface Device Android Attack Framework☆47Apr 30, 2017Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Main repository to pull all Cisco related projects.☆16Sep 21, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Build your own Bad USB Stick for pentesting with wifi and dip switches☆42Dec 3, 2016Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Dnsmasq DNS proxy and DHCP server.☆12Mar 1, 2017Updated 9 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A list of published research documents☆248Jul 10, 2024Updated last year
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 10 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- WiFi Enabled USB Rubber Ducky☆152Dec 17, 2016Updated 9 years ago
- USB HID for Penetration Testing☆13Apr 6, 2016Updated 10 years ago