withdk / badusb2-mitm-pocView external linksLinks
BadUSB 2.0 USB-HID MiTM POC
☆289Jun 22, 2016Updated 9 years ago
Alternatives and similar repositories for badusb2-mitm-poc
Users that are interested in badusb2-mitm-poc are comparing it to the libraries listed below
Sorting:
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- powerful auto-backdooring utility☆748Dec 20, 2017Updated 8 years ago
- A list of published research documents☆248Jul 10, 2024Updated last year
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Aug 21, 2015Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 6 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- SpeedPhishing Framework☆448Aug 8, 2019Updated 6 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- Man in the Middle analysis tool for Bluetooth.☆535Feb 24, 2020Updated 5 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- ☆79May 13, 2016Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Oct 22, 2016Updated 9 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- LLDB MCP Integration + other helpful commands☆740Mar 29, 2025Updated 10 months ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year