One BadUSB to rule them all using ATmega32U4
☆22Nov 19, 2020Updated 5 years ago
Alternatives and similar repositories for TheOneBadUSB
Users that are interested in TheOneBadUSB are comparing it to the libraries listed below
Sorting:
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆31Nov 1, 2021Updated 4 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Feb 19, 2026Updated last week
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Feb 9, 2024Updated 2 years ago
- Process Injection: CreateRemoteThread☆26Dec 17, 2020Updated 5 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆34Aug 4, 2021Updated 4 years ago
- ☆38Feb 26, 2025Updated last year
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated last year
- Indirect NT syscalls LSASS dumper.☆46Jul 9, 2023Updated 2 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Mobirise plugin using Google Firebase☆10Oct 6, 2017Updated 8 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Supercharged USB bootloader for various PIC24/dsPIC33 MCUs.☆11Jul 8, 2021Updated 4 years ago
- Test WPA3 using virtual Wi-Fi interfaces☆51Jul 16, 2022Updated 3 years ago
- ☆19Aug 6, 2025Updated 6 months ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- ☆12Jan 8, 2026Updated last month
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆38Feb 11, 2026Updated 2 weeks ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆16May 10, 2024Updated last year
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- CRC Tool Kit☆18Oct 5, 2012Updated 13 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ☆14Jul 26, 2025Updated 7 months ago