letterpressA nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.
Stars: ✭ 22 (-29.03%)
Trezor.NetCross platform C# library for talking to the Trezor hardwarewallet
Stars: ✭ 38 (+22.58%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (+48.39%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (+396.77%)
dos-attackThe program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-9.68%)
nxbtControl your Nintendo Switch through a website, terminal, or macro.
Stars: ✭ 340 (+996.77%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2080.65%)
authenticator-rsRust library to interact with Security Keys, used by Firefox
Stars: ✭ 209 (+574.19%)
EspTinyUSBESP32S2 native USB library. Implemented few common classes, like MIDI, CDC, HID or DFU (update).
Stars: ✭ 375 (+1109.68%)
Wall-of-ShameA framework for capturing user credentials and sensitive device information.
Stars: ✭ 57 (+83.87%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+2829.03%)
sgx-tutorial-space18Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (+41.94%)
hidstreamStreaming HID events in Node.js
Stars: ✭ 52 (+67.74%)
rc4md5cryrc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-51.61%)
mx3000controlPerixx MX-3000 mouse unofficial configuration tool for Linux
Stars: ✭ 20 (-35.48%)
windows-touchpadMake use of touchpad for handwriting in Windows
Stars: ✭ 30 (-3.23%)
joyconpiAn attempt at emulating a Nintendo Switch Joy-Con controller with a Raspberry Pi
Stars: ✭ 24 (-22.58%)
python-hid-parserTyped pure Python library to parse HID report descriptors
Stars: ✭ 31 (+0%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-19.35%)
assapAnti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-29.03%)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-32.26%)
MitmMan in the middle tool
Stars: ✭ 30 (-3.23%)
ArmorArmor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+635.48%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+164.52%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-22.58%)
muniaMulti-use Nintendo Input Adapter
Stars: ✭ 18 (-41.94%)
pi400kbRaw HID keyboard forwarder to turn the Pi 400 into a USB keyboard
Stars: ✭ 182 (+487.1%)
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+232.26%)
iivx[outdated] Beatmania IIDX and Sound Voltex hybrid controller
Stars: ✭ 45 (+45.16%)
prosceneProcessing library for the creation of interactive scenes
Stars: ✭ 45 (+45.16%)
ESP32-USB-Soft-HostAn Arduino wrapper to @sdima1357's usb_soft_host esp-idf example
Stars: ✭ 119 (+283.87%)
deautherAn interactive command-line deauther for macOS.
Stars: ✭ 70 (+125.81%)
gods4Golang library to interact with Sony DualShock4
Stars: ✭ 26 (-16.13%)
BlueRetroMultiplayer Bluetooth controllers adapter for retro video game consoles
Stars: ✭ 520 (+1577.42%)
ES-TimerA USB timer powered by Digispark ATtiny85 according to 🍅 pomodoro time management technique
Stars: ✭ 45 (+45.16%)
RaySRayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (+38.71%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (+245.16%)
DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (+51.61%)
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (+180.65%)
openwrt-useful-toolsA repo containing different tools compiled specifically for the Hak5 WiFi Pineapple MK6 and MK7.
Stars: ✭ 155 (+400%)
hidapi-rsRust bindings for the hidapi C library
Stars: ✭ 103 (+232.26%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (+9.68%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+358.06%)
joy-con-webhidUse the Nintendo Switch Joy-Cons via the WebHID API
Stars: ✭ 61 (+96.77%)
SerialPunditSerial port communication in Java - FTDI D2XX, HID API, X/Y modem
Stars: ✭ 116 (+274.19%)
IntruderpayloadsA collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+8864.52%)
stadiacontrollerCommand line application that emulates an Xbox 360 controller from a wired Stadia controller on Windows.
Stars: ✭ 142 (+358.06%)
android-usb-scriptAn Android app that allows you to script USB gadgets (work-in-progress).
Stars: ✭ 15 (-51.61%)
ddosDDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (+170.97%)
PummelSocks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (+70.97%)