misterch0c / usbdrivebyLinks
USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and rerouting DNS within seconds of plugging it in
☆10Updated 10 years ago
Alternatives and similar repositories for usbdriveby
Users that are interested in usbdriveby are comparing it to the libraries listed below
Sorting:
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- zeus-style banking trojan☆14Updated 8 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- Pentest tools for Windows hacking processes☆13Updated 8 years ago
- The Watcher version 5.0☆18Updated 7 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- Various Wireless Driver patches☆32Updated 6 years ago
- Various Kali Scripts☆55Updated 8 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- Useful pentesting scripts☆83Updated 4 months ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 11 years ago
- Password cracking utility☆53Updated 4 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆22Updated 7 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆77Updated 5 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- This program show you IMSI numbers of cellphones around you.☆13Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Hacking environment installation scripts for OS X☆26Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago