USB Attack Development Platform
☆34May 19, 2018Updated 7 years ago
Alternatives and similar repositories for usbninja
Users that are interested in usbninja are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆51Nov 11, 2022Updated 3 years ago
- Fault Injection Research and Resources☆21Feb 6, 2023Updated 3 years ago
- Learning FreeBSD Kernel Hacking - Exercises☆63Jun 2, 2020Updated 5 years ago
- Accoustic Cryptanalysis - Side channel attacks on Keyboards☆17Sep 1, 2012Updated 13 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SMS or Network Jam attack By:- Dark_knight☆11Sep 30, 2020Updated 5 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Rust interface to the Tor Control Protocol (TorCP)☆13Nov 1, 2021Updated 4 years ago
- Upstream crosstool-ng + xilinx branches☆15Mar 23, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Provides functions to open and unlink shared memory without relying on cgo.☆12Jan 6, 2023Updated 3 years ago
- an Awk clone☆17Apr 14, 2019Updated 6 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- FPGA glitcher based on toothlessco's arty-glitcher, but for the icebreaker☆19Dec 10, 2019Updated 6 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Go-View is a project to build a rudementary GUI library for Go.☆18Jun 3, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- hacks instagram, facebook,sms attack,other options yet tot come out!☆17Jul 12, 2018Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs.☆31May 22, 2017Updated 8 years ago
- r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It in…☆17Oct 6, 2017Updated 8 years ago
- First library produced from the Multiverse OS singularity experimental project, rewrite of the standard library exec to launch fileless e…☆11Apr 20, 2020Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- Go PASETO implementation☆19Sep 2, 2020Updated 5 years ago
- Tool for filter and quick ssh into servers.☆15Oct 10, 2018Updated 7 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- ☆11Dec 28, 2019Updated 6 years ago
- Hard fork of golang.org/exp/shiny☆12Nov 14, 2020Updated 5 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- BadProxy is the tool which show a man in middle attack over the internet over the proxy☆10Mar 31, 2018Updated 7 years ago
- Host Card Emulation. Based on Cyanogenmod 9 Android. Design goal is relay DesFire card communication (Widely used in transportation syste…☆29Mar 8, 2014Updated 12 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago