matterpreter / penteensyLinks
USB HID for Penetration Testing
☆13Updated 9 years ago
Alternatives and similar repositories for penteensy
Users that are interested in penteensy are comparing it to the libraries listed below
Sorting:
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Bash Bunny fun!☆52Updated 7 years ago
- Powershell Reverse Rubber Ducky☆56Updated 10 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆115Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 5 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 10 years ago
- Script to generate malicious debian packages (debain trojans).☆120Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Updated 10 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆12Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Self contained htaccess shells and attacks☆15Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆66Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago