poisontap

Computer Exploit

Exploits a locked computer to install a persistent backdoor and expose internal network resources.

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

GitHub

6k stars
334 watching
995 forks
Language: JavaScript
last commit: almost 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
opennhp/opennhp A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. 13,515
manisso/fsociety A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment 10,637
rogandawes/p4wnp1 A customizable USB attack platform utilizing a low-cost single-board computer for remote shell access and device control. 4,038
owasp/nettacker Automated tool for identifying vulnerabilities and gathering information about network services and systems. 3,618
pi-hole/pi-hole A software solution to block unwanted internet content by intercepting DNS queries at the network level. 49,206
diafygi/webrtc-ips A tool to obtain users' local and public IP addresses via WebRTC STUN requests 3,439
jofpin/trape A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks 8,116
klzgrad/naiveproxy A system designed to disguise and protect internet traffic from censorship and surveillance by leveraging Chrome's network stack 6,685
liamg/traitor A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems 6,689
hackerschoice/thc-tips-tricks-hacks-cheat-sheet A collection of tips and tricks for using Linux shell scripting and SSH techniques to gain access and manipulate systems remotely. 3,149
enablesecurity/wafw00f A tool to identify and fingerprint Web Application Firewalls. 5,296
deepfence/secretscanner A tool that scans container images and file systems for sensitive data such as passwords and keys. 3,134
kgretzky/evilginx2 A tool used to create phishing attacks bypassing security measures 10,924
stamparm/maltrail Detects and analyzes malicious traffic patterns to identify potential security threats. 6,535
drk1wi/modlishka A tool designed to support security-related testing and mitigation by providing a transparent reverse proxy service with flexible configuration options. 4,847