offensive-security / hid-backdoor-peensyLinks
Reliable Teensy Penetration Testing Payload
☆179Updated 12 years ago
Alternatives and similar repositories for hid-backdoor-peensy
Users that are interested in hid-backdoor-peensy are comparing it to the libraries listed below
Sorting:
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Powershell Reverse Rubber Ducky☆56Updated 10 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆143Updated 8 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 6 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆67Updated 6 years ago
- WPS scan and pwn tool☆69Updated 5 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- ☆249Updated 8 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆144Updated 9 years ago
- Porting the Pineapple to the Raspberry Pi☆84Updated 12 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆96Updated 8 years ago
- ☆83Updated 7 years ago
- Misc scripts and tools for WiFi☆104Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Passive Vulnerability Auditor☆132Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆137Updated 9 years ago
- WIreless Hacking Tools☆165Updated 11 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆57Updated 9 years ago
- USB Attack to Decrypt Wi-Fi Communications☆33Updated 9 years ago
- Fetch, install and search exploit archives from exploit sites.☆115Updated last year
- The WiFi Pineapple Wiki☆246Updated 5 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆157Updated 9 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 6 years ago
- ☆52Updated 13 years ago