32 Resources
C/C++ hid-attacks Libraries
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
SysmonSimulator SysmonSimulator is an Open source Windows event simulation utility created in C language, that can be used to simulate most of the att
This is the source code for Mirai. The compilation method has been simplified a little and some modifications have been made.
Mirai BotNet to Tashiro(未来砲) Leaked Linux.Mirai Source Code for Research/IoT Development Purposes Uploaded for research purposes and so we can develop
Arduino code that runs on a Pi Pico (2040) to emulate a USB HID Joystick
CRSFJoystick Arduino code using the mbed core that runs on a Pi Pico (2040) to emulate a USB HID Joystick Pirmarily developed to use and ExpressLRS re
Ramp is a HID attack program that steals all connected WiFi passwords within 13 seconds.
Ramp Ramp is a HID attack program that steals all connected WiFi passwords within 13 seconds. Tested Windows 10 Warning Ramp has been created for the
Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts
Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc.
Allows to swap the Fn key and left Control key and other tweaks on Macbook Pro and Apple keyboards in GNU/Linux
A patched hid-apple kernel module UPDATE August 2020: swap_fn_leftctrl is now built-in in Linux 5.8 🎉 UPDATE Jun 2020: New feature added (swap_fn_f13
Thc-ipv6 - IPv6 attack toolkit
THC-IPV6-ATTACK-TOOLKIT (c) 2005-2022 [email protected] https://github.com/vanhauser-thc/thc-ipv6 Licensed under AGPLv3 (see LICENSE file) INTRODUCTION Th
Gesture-Detecting-Macro-Keyboard - Glorified Bluetooth macro keyboard with machine learning (TensorFlow Lite for Microcontrollers) running on an ESP32.
Gesture detection tldr; Glorified Bluetooth macro keyboard with machine learning (TensorFlow Lite for Microcontrollers) running on an ESP32. Main feat
Flood is a tool which expolits some the most popular DDoS attacks
FLOOD Flood is a DDoS(Destributed denail of service) tool which can exploit some of the most popular DoS/ DDoS attacks. Features flood v0.0.1 It Suppo
Evasive shellcode loader for bypassing event-based injection detection (PoC)
DripLoader (PoC) Evasive shellcode loader for bypassing event-based injection detection, without necessarily suppressing event collection. The project
Multiple payloads for the digispark digistump AVR boards.
Multiple payloads for the digispark digistump AVR boards. Some are translated from RubberDucky and some are original..
MFD Button Switches for Flight Simulators. Arduino *.ino and PCB Gerber files and a picture. Now with FalconBMS specific firmwares.
MFD-Switches Use at your own risk. I am not accepting responsiblity for anything. Copyright Ron Lyttle 2021. I have to copyright because of some of th
Tiny and portable usb host and device stack for mcu with usb ip
Tiny and portable usb host and device stack for mcu with usb ip
A USB timer powered by Digispark ATtiny85 according to pomodoro time management technique
⏲ ES Timer Powered ⚡ by Digispark ATtiny85 and it works based on 🍅 pomodoro time management technique a special timer for all those that work a lot w
An advanced loader for infecting devices.
loader - An advanced loader for infecting devices. loader is a minimal, advanced loader written in C that uses its built-in parser to parse data from
Wireless keystroke injection attack platform
Wireless keystroke injection attack platform
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors".
COBALT STRIKE 4.4 Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to exe
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
Overview OneShot-C - implementation of OneShot on C OneShot-С performs Pixie Dust attack without having to switch to monitor mode. Features Pixie Dust
Raw HID keyboard forwarder to turn the Pi 400 into a USB keyboard
Raspberry Pi 400 as a USB HID Keyboard Hook your Pi 400 up to your PC somehow, using a USB Type-C cable into the power port. Anker make good ones- I u
Windows kernel-mode driver emulating well-known USB game controllers.
Windows kernel-mode driver emulating well-known USB game controllers.
An USB Rubberducky example for ESP32-S2 module with SD Card 🦆
ESP32-S2 WUD-Ducky This project is an attempt to add USB HID to the default example provided with @AprilBrother's WUD (*), however it also supports an
IR2USB - IR to USB HID Converter based on ATtiny45/85
IR2USB - IR to USB HID Converter based on ATtiny45/85 IR2USB receives signals from an infrared remote control and converts them into keyboard inputs,
Evasive shellcode loader for bypassing event-based injection detection (PoC)
(cleaned up version here: https://github.com/xinbailu/DripLoader-Ops) DripLoader (PoC) Evasive shellcode loader for bypassing event-based injection de
Code Injection, Inject malicious payload via pagetables pml4.
PageTableInjection Code Injection, Inject malicious payload via pagetables pml4. Introduction This is just a proof-of-concept of the page table inject
ESP8266 software USB host through general IO pins. We can connect up to 2 USB-LS HID (keyboard mouse joystick) devices simultaneously.
esp8266_usb_soft_host Test for esp8266 usb host . Works with ESP-IDF v3.4 80MHz and 160MHz. WorkInProgress Test run with mouse & combined mouse & keyb
汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试
Process-Injection 目前网上进程注入的文章很多,但是代码质量参差不齐,很多还只有x86下的代码,同时对于进程注入的探讨大多停留在各种注入手法上,缺少系列的汇总性的研究文章,故想要在本项目中汇总所有可以接触到的进程注入的手法,自行研究复现总结成文章,同时会将调试好的可执行的代码贴出,完
esp32S2 USB HID host example.
Simple usb host HID example Since usb host support is still beta stage and include file is in private_include i copied component to this example. Code
Side-channel file transfer between independent VM executed on the same physical host
Inter-process or cross-VM data exchange via CPU load modulation What is this I made this PoC as a visual aid for an online discussion about M1RACLES -
Realtime Client/Server app for Linux allowing joystick (and other HID) data to be transferred over a local network
netstick What is it? Netstick enables HID devices to be remotely connected between a "client" and "server" over a network connection. It allows the ke
An Arduino wrapper to @sdima1357's usb_soft_host esp-idf example
ESP32 USB Soft Host library for Arduino IDE This is mainly a wrapper around the excellent work of Dmitry Samsonov (@sdima1357) with esp32_usb_soft_hos
ESP32 software USB host through general IO pins. We can connect up to 4 USB-LS HID (keyboard mouse joystick) devices simultaneously.
esp32_usb_soft_host esp32 USB-LS pure software host thru general IO pins. Up to 4 HID devices simultaneously. board ~$3 :https://www.aliexpress.com/pr
Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"
Overview This repository contains the source code to reproduce the experiments of the paper: Lord of the Ring(s): Side Channel Attacks on the CPU On-C