tenable / router_badusb
BadUSB in Routers
β196Updated 2 years ago
Alternatives and similar repositories for router_badusb:
Users that are interested in router_badusb are comparing it to the libraries listed below
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β252Updated 6 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β287Updated 4 months ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linuxβ124Updated 5 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devicesβ86Updated 7 years ago
- Wireless mouse/keyboard attack with replay/transmit pocβ86Updated 8 years ago
- KeySniffer device discovery tools and public advisoriesβ117Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β207Updated 7 years ago
- Mobile UI for kismetβ179Updated 5 months ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensyβ142Updated 8 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.β327Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testingβ178Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linuxβ85Updated 5 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)β111Updated 6 years ago
- Tool made to automate tasks of pentesting.β165Updated 5 years ago
- Arduino Rubber Ducky Frameworkβ107Updated 5 years ago
- Automates some pentest jobs via nmap xml fileβ323Updated 6 years ago
- My collection of metasploit auxiliary post-modulesβ190Updated 5 years ago
- A little post-exploit tool that carefully clean *NIX access logsβ119Updated 6 years ago
- HID attack payload generator for Arduinosβ164Updated 8 months ago
- Toolkit for implant attack of IoT devicesβ134Updated 6 years ago
- search for hosts info with shodanβ230Updated 3 years ago
- Operational Security utility and automator.β135Updated 4 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass aβ¦β257Updated last year
- List of Awesome Offensive Tools written in GOβ200Updated 6 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploitβ152Updated 7 years ago
- unix SSH post-exploitation 1337 toolβ136Updated 6 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β280Updated last year
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS andβ¦β115Updated 4 years ago
- Collect information about email addresses from Pastebinβ35Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.β184Updated 5 years ago