xcellerator / usbninjaLinks
USB Attack Development Platform
☆31Updated 7 years ago
Alternatives and similar repositories for usbninja
Users that are interested in usbninja are comparing it to the libraries listed below
Sorting:
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- ☆36Updated 5 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆24Updated 5 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- ☆20Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Shellcode process injector☆27Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- ☆13Updated 4 years ago
- USB armory - hardware control tool☆32Updated 3 months ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- A centralized place to collect USB Ninja payloads☆17Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 5 years ago