USB HID for Penetration Testing
☆13Apr 6, 2016Updated 9 years ago
Alternatives and similar repositories for penteensy
Users that are interested in penteensy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Original Chinese hardware and source code from oshwhub.com☆20Apr 3, 2025Updated 11 months ago
- Example project which simulates an interesting analytics use case using MemSQL Pipelines.☆14Apr 25, 2017Updated 8 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- BlackIceMx - Core Module carrier with MixMods/Pmod interfaces☆17Sep 2, 2019Updated 6 years ago
- FlexRadio GUI for Linux☆17Feb 12, 2026Updated last month
- Zeek Junk Drawer - Just some scripts and a place to put them☆28Sep 22, 2020Updated 5 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- ESP32 Pentesting tool project☆15May 26, 2021Updated 4 years ago
- a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754☆17Mar 27, 2018Updated 7 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- ESP8266 ROM Bootloader utility☆17Jul 17, 2017Updated 8 years ago
- A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP.☆13Sep 13, 2014Updated 11 years ago
- GNU Radio M17 protocol implementation☆23Feb 20, 2023Updated 3 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 8 years ago
- ☆15Jul 15, 2018Updated 7 years ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Source for BDaySpotify☆12May 11, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- ☆51Jun 24, 2016Updated 9 years ago