Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter
☆162Jul 22, 2021Updated 4 years ago
Alternatives and similar repositories for UnifyingVulnsDisclosureRepo
Users that are interested in UnifyingVulnsDisclosureRepo are comparing it to the libraries listed below
Sorting:
- Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.☆729Jan 2, 2024Updated 2 years ago
- ☆32Jul 15, 2019Updated 6 years ago
- ☆132Jan 15, 2020Updated 6 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆23Jan 15, 2019Updated 7 years ago
- ☆105Dec 20, 2021Updated 4 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Nov 18, 2019Updated 6 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆434Jul 24, 2022Updated 3 years ago
- KeySniffer device discovery tools and public advisories☆119Jul 26, 2016Updated 9 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- GNU Radio module and Wireshark dissector for the Nordic Semiconductor nRF24L Enhanced Shockburst protocol.☆121Sep 3, 2022Updated 3 years ago
- JackIt - Exploit Code for Mousejack☆889Oct 1, 2020Updated 5 years ago
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆107Jul 27, 2016Updated 9 years ago
- ☆47Dec 6, 2019Updated 6 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Sep 22, 2023Updated 2 years ago
- MouseJack device discovery and research tools☆1,367Dec 19, 2017Updated 8 years ago
- iClass / Picopass tool for libnfc☆62Mar 26, 2021Updated 4 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Aug 13, 2020Updated 5 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,784Jul 27, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆187Apr 4, 2022Updated 3 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆484Jul 27, 2019Updated 6 years ago
- ☆20Dec 13, 2023Updated 2 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- BadUSB in Routers☆198Nov 29, 2022Updated 3 years ago
- ☆52Oct 17, 2019Updated 6 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Apr 10, 2019Updated 6 years ago
- Use an arduino as a logitech wireless 🐭☆190May 5, 2020Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Mar 22, 2020Updated 5 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago