whid-injector / whid-31337
WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass air-gapped systems, conduct mousejacking attacks, do acoustic surveillance, RF replay attacks and much more. In practice, is THE Wet Dream of any Security Consultant out there!
☆258Updated last year
Alternatives and similar repositories for whid-31337
Users that are interested in whid-31337 are comparing it to the libraries listed below
Sorting:
- Script for orchestrating mana rogue WiFi Access Points.☆242Updated 3 months ago
- Mousejack for ATmega32u4☆213Updated last year
- HID attack payload generator for Arduinos☆164Updated 10 months ago
- WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, …☆577Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆142Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆290Updated 6 months ago
- WiFi Enabled USB Rubber Ducky☆150Updated 8 years ago
- USB Rubber Ducky for ATTiny85☆111Updated 4 years ago
- BadUSB cable project☆385Updated 9 months ago
- BadUSB cable based on Attiny85 microcontroller with data line enabled.☆208Updated last month
- Python port of infamous duckencoder for RubberDucky☆138Updated last year
- A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into…☆526Updated 2 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆112Updated 6 years ago
- Run Hak5 Bash Bunny scripts on a raspbery pi☆238Updated 8 years ago
- A collection of Payloads for the WHID Cactus☆50Updated 5 years ago
- Evil client portion of EAP relay attack☆202Updated last year
- WiFi keylogger with Micro SD slot, based on the Atmega32U4 microcontroller and the ESP32-PICO module☆227Updated last month
- Converting your AR150 to a Wifi Pineapple NANO☆139Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆253Updated 6 years ago
- SensePost's modified hostapd for wifi attacks.☆568Updated 9 months ago
- Poor man's rubber ducky☆75Updated 6 years ago
- Simple code to execute payloads depending on the detected OS.☆32Updated 5 years ago
- BadUSB in Routers☆196Updated 2 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆85Updated 8 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆497Updated 7 years ago
- USB keystroke injector controlled by smartphone.☆228Updated 3 months ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated 10 months ago
- Brute force/de Bruijn script for triggering an ook rf device with a rfcat dongle.☆123Updated 8 years ago
- rfcat-rolljam is a python script to easily "jam", capture, and replay rolling code signals using two yard stick one devices and rfcat.☆185Updated last year