tothi / usbgadget-tool
Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)
☆140Updated 3 years ago
Alternatives and similar repositories for usbgadget-tool:
Users that are interested in usbgadget-tool are comparing it to the libraries listed below
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- Detect & filter duplicate hashcat rules☆44Updated 3 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆77Updated last year
- ☆139Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆141Updated 3 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆80Updated 4 years ago
- Evil client portion of EAP relay attack☆202Updated last year
- easy-to-use payload hosting☆270Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆185Updated 3 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- ☆150Updated last year
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆14Updated 5 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- ☆125Updated 2 years ago
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆59Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- ☆73Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- ☆190Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- ☆107Updated 9 months ago
- Remotely enables Restricted Admin Mode☆209Updated 3 years ago
- Password Spraying Framework☆63Updated 2 years ago
- PowerShell payload generator☆116Updated 3 years ago