tst-zdouglas / BadAndroidLinks
☆13Updated 11 years ago
Alternatives and similar repositories for BadAndroid
Users that are interested in BadAndroid are comparing it to the libraries listed below
Sorting:
- A collection of scripts and tools I have authored to aid in Pentesting, provided under GNUv3, NOTE: I am not liable if you use them for i…☆34Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 7 years ago
- Board layout☆12Updated 10 years ago
- Wi-Fi Backdoors☆42Updated 10 years ago
- new WPS attack tool☆60Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- ☆13Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 4 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107Updated 11 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Build your own Bad USB Stick for pentesting with wifi and dip switches☆44Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆39Updated 10 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 10 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Updated 9 years ago
- A script for 802.11 mass-deauthentication☆29Updated 11 years ago
- SlyPI☆20Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Updated 8 years ago
- ☆30Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago