Several script and images used with the juice jacking kiosks
☆12Jul 21, 2013Updated 12 years ago
Alternatives and similar repositories for JuiceJacking
Users that are interested in JuiceJacking are comparing it to the libraries listed below
Sorting:
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆101Apr 25, 2017Updated 8 years ago
- Recognize hand gestures using MediaPipe and publish them to MQTT.☆14Mar 4, 2025Updated last year
- mousejack hack☆13Mar 18, 2016Updated 10 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- A Node.js module to lookup URLs for suspected phishing/malware sites using Google's Safe Browsing Lookup API☆18Jan 26, 2017Updated 9 years ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Oct 27, 2025Updated 4 months ago
- A Digispark rubber ducky script for spawn a reverse shell in less than 3 seconds.☆17Dec 30, 2018Updated 7 years ago
- For Windows System☆11Aug 14, 2021Updated 4 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- A bruteforce attack script to find the IOS restriction password from PBKDF2-hmac-sha1 algorithm and salt.☆13Dec 30, 2017Updated 8 years ago
- A simple project how you can display values from your MikroTik Routerboard to an OLED display connected to an ESP8266 via HTTP POST reque…☆16Apr 28, 2021Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- RRD Custom Component for Home Assistant☆13May 20, 2024Updated last year
- bypass google account verification (addrom.com)☆26Aug 8, 2024Updated last year
- A counter strike rich presense app for Discord☆14Dec 8, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A integration for minimizing heat loss through optimal venting☆18Updated this week
- A Digispark rubber ducky script for Windows to Extract and Mail Wifi profiles (SSID, password) in plain text format.☆27Dec 3, 2018Updated 7 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Zwei-Faktor-Authentifizierung für WordPress. Mit dem Fokus auf Privatsphäre und Datenschutz.☆39Apr 25, 2023Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Mozilla Firefox Tweaks. Use at your own risk and fun.☆16Nov 27, 2023Updated 2 years ago
- Nethunter app with our own modifications☆16Feb 13, 2022Updated 4 years ago
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago
- Little thermostat based on AZ-Touch hardware and esphome☆25Dec 21, 2022Updated 3 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago