nemanjan00 / badUSBLinks
☆13Updated 8 years ago
Alternatives and similar repositories for badUSB
Users that are interested in badUSB are comparing it to the libraries listed below
Sorting:
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- XSS Weaponization☆34Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Teensy code to brute force a keylogger's unlock code☆15Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago