IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)
☆66Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for IRON-HID
Users that are interested in IRON-HID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Mar 22, 2015Updated 11 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Code for the Arduino for the Secret Agents book☆14Sep 12, 2015Updated 10 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆26May 17, 2015Updated 10 years ago
- A (very basic) steganographic device, for encoding a payload into an image☆24Sep 23, 2015Updated 10 years ago
- Python - Human Interface Device Android Attack Framework☆47Apr 30, 2017Updated 8 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Main repository to pull all Cisco related projects.☆16Sep 21, 2017Updated 8 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Dnsmasq DNS proxy and DHCP server.☆12Mar 1, 2017Updated 9 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A list of published research documents☆248Jul 10, 2024Updated last year
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- WiFi Enabled USB Rubber Ducky☆152Dec 17, 2016Updated 9 years ago