ppolstra / usb-impersonatorLinks
USB Impersonator
☆34Updated 3 years ago
Alternatives and similar repositories for usb-impersonator
Users that are interested in usb-impersonator are comparing it to the libraries listed below
Sorting:
- Security Advisories and Researches☆16Updated 10 years ago
- ☆17Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- ☆12Updated 8 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Just a collection of scripts☆40Updated 5 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 9 years ago
- See here:☆42Updated 12 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- new WPS attack tool☆55Updated 9 years ago
- Maltego with a twist of wireless☆26Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- ☆33Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆12Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago