BadUSB 2.0 USB-HID MiTM POC
☆289Jun 22, 2016Updated 9 years ago
Alternatives and similar repositories for badusb2-mitm-poc
Users that are interested in badusb2-mitm-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- A list of published research documents☆248Jul 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- LLDB MCP Integration + other helpful commands☆742Mar 29, 2025Updated 11 months ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- WarBerryPi - Tactical Exploitation☆2,224Nov 9, 2019Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆150Aug 21, 2015Updated 10 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Bad USB collections with malicious firmware☆75Jan 10, 2015Updated 11 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 7 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Jan 20, 2017Updated 9 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆870Aug 4, 2017Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Sep 30, 2021Updated 4 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- ☆79May 13, 2016Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago