tothi / usbgadget-toolLinks
Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)
☆142Updated 3 years ago
Alternatives and similar repositories for usbgadget-tool
Users that are interested in usbgadget-tool are comparing it to the libraries listed below
Sorting:
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆78Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆142Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆168Updated 2 months ago
- easy-to-use payload hosting☆270Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Detect & filter duplicate hashcat rules☆45Updated 5 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- ☆140Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- A VS Code extension to preview XML nmap output☆44Updated 4 months ago
- Creates and sends fake meeting invite☆66Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- ☆38Updated 5 months ago
- Evil client portion of EAP relay attack☆201Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- ☆44Updated 4 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 4 months ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆80Updated 4 years ago
- FETCH THE PASSWORD STRETCHER☆39Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆81Updated 4 years ago
- ☆74Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year