tothi / usbgadget-tool
Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)
☆135Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for usbgadget-tool
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆127Updated 8 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆66Updated last year
- Evil client portion of EAP relay attack☆191Updated last year
- easy-to-use payload hosting☆264Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆138Updated 2 years ago
- Machine-learn password mangling rules☆109Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year
- LD_PRELOAD rootkit☆122Updated 8 months ago
- Generates several passwords based on one single word, like a company's name.☆23Updated 2 years ago
- ☆124Updated last year
- This code was used for the blogpost on secjuice.☆40Updated 5 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆108Updated 4 years ago
- ☆133Updated last year
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆186Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- ☆66Updated 4 years ago
- Detect & filter duplicate hashcat rules☆41Updated 2 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Updated 3 years ago
- Collection of hashcat lists and things.☆50Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆226Updated 3 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆182Updated 4 years ago
- ☆104Updated 3 months ago
- Creates and sends fake meeting invite☆51Updated 3 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆75Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 10 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆19Updated this week
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago