ppolstra / usb-impersonator
USB Impersonator
☆34Updated 3 years ago
Related projects: ⓘ
- ☆23Updated this week
- Metasploit Usage Wiki☆47Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆39Updated 5 years ago
- ☆17Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆28Updated 10 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆46Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Wi-Fi Backdoors☆34Updated 9 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆20Updated 9 years ago
- ☆18Updated 9 years ago
- Extract LZMA sections from cable modem firmware images☆20Updated 10 years ago
- Rapid7 Metasploit API client library written in Ruby☆24Updated 7 months ago
- MiTM tools and scripts☆19Updated 9 years ago
- Some NSE scripts to search information from routers☆37Updated 8 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 8 years ago
- Purposely Vulnerable Embedded Device☆21Updated 7 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- Projects and POCs☆58Updated 10 years ago
- SAVIORBURST☆19Updated 8 years ago
- ☆33Updated this week
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆58Updated 6 years ago
- Automatic backdooring apk with meterpreter (PoC)☆50Updated 8 years ago
- ssh session type for metasploit☆97Updated last year
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago