r4ulcl / TheOneBadUSBLinks
One BadUSB to rule them all using ATmega32U4
☆23Updated 4 years ago
Alternatives and similar repositories for TheOneBadUSB
Users that are interested in TheOneBadUSB are comparing it to the libraries listed below
Sorting:
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 10 months ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Rubber Ducky powered by NeoKey☆27Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Legba recipes.☆51Updated last year
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 3 weeks ago
- Simple Tool for webhacking☆11Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- ☆11Updated 2 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- Script to setup a phishing server on the cloud☆12Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆15Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆116Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- ☆26Updated 4 months ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year