therealdreg / evilmass_at90usbkey2
evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)
☆31Updated last year
Alternatives and similar repositories for evilmass_at90usbkey2:
Users that are interested in evilmass_at90usbkey2 are comparing it to the libraries listed below
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Fuzz Network Traffic☆18Updated 3 months ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆27Updated 3 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- Password list character frequency analyzer that can output hashcat masks☆17Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- wordlists for password cracking☆27Updated 2 years ago