tothi / usbgadget-toolLinks
Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)
☆142Updated 4 years ago
Alternatives and similar repositories for usbgadget-tool
Users that are interested in usbgadget-tool are comparing it to the libraries listed below
Sorting:
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆136Updated last year
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆81Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 3 years ago
- Detect & filter duplicate hashcat rules☆46Updated 8 months ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- easy-to-use payload hosting☆272Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Evil client portion of EAP relay attack☆204Updated 2 years ago
- ☆140Updated last year
- Collection of hashcat lists and things.☆51Updated 5 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆170Updated 5 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 4 years ago
- OSDP attack tool (and the Elvish word for friend)☆101Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆35Updated 3 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆82Updated 4 years ago
- Password Spraying Framework☆63Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- Creates and sends fake meeting invite☆70Updated 4 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 4 years ago
- Extract credentials and other useful info from network captures☆73Updated 2 years ago
- Machine-learn password mangling rules☆113Updated 2 years ago
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated last month