yownas / fireflyLinks
Remote shell/exfiltration using keyboard leds.
☆26Updated 8 years ago
Alternatives and similar repositories for firefly
Users that are interested in firefly are comparing it to the libraries listed below
Sorting:
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- RFID spoofing code from scanlime.org☆20Updated 13 years ago
- ANWI - All New Wireless IDS☆28Updated 6 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆51Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆58Updated 6 years ago
- Hacker Warehouse electronic badge that was made for DEF CON 25☆17Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Removed according to regulations☆35Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Magnetic Pentesting tool for Raspberry Pi☆61Updated 5 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆90Updated 7 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Updated 3 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago