USB Attack Development Platform
☆34May 19, 2018Updated 7 years ago
Alternatives and similar repositories for usbninja
Users that are interested in usbninja are comparing it to the libraries listed below
Sorting:
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- Clone an airtag onto an esp32☆18Jul 12, 2025Updated 7 months ago
- BadProxy is the tool which show a man in middle attack over the internet over the proxy☆10Mar 31, 2018Updated 7 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Fault Injection Research and Resources☆21Feb 6, 2023Updated 3 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Utilities for sniffing bluetooth low-energy (BLE) packets using a CC2540 USB sniffer dongle☆28Jul 8, 2020Updated 5 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆32Sep 15, 2016Updated 9 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Scripts & Code patches for analyzing/emulating/copying FM1208 CPU Cards (读取复制 SAK28 CPU卡 FM1208)☆20Mar 7, 2025Updated last year
- A scraping and aggregating package using the CollegeFootballData API☆11Dec 11, 2020Updated 5 years ago
- iText Samples☆11Jan 31, 2014Updated 12 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Z-Wave Packet Interception and Injection Tool☆37Nov 4, 2015Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- cheap and terrible voltage glitcher hardware/software☆42Jan 1, 2020Updated 6 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- Data Commander is a front-end for SQL and other databases. The program has a plugin architecture for adding arbitrary data providers.☆11Feb 23, 2026Updated 2 weeks ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago