poisontap
Computer Exploit
Exploits a locked computer to install a persistent backdoor and expose internal network resources.
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
6k stars
334 watching
994 forks
Language: JavaScript
last commit: about 6 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |
| A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,698 |
| A customizable USB attack platform utilizing a low-cost single-board computer for remote shell access and device control. | 4,069 |
| Automated tool for identifying vulnerabilities and gathering information about network services and systems. | 3,700 |
| A software solution to block unwanted internet content by intercepting DNS queries at the network level. | 49,492 |
| A tool to obtain users' local and public IP addresses via WebRTC STUN requests | 3,437 |
| A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks | 8,157 |
| A system designed to disguise and protect internet traffic from censorship and surveillance by leveraging Chrome's network stack | 6,775 |
| A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,735 |
| A collection of tips and tricks for using Linux shell scripting and SSH techniques to gain access and manipulate systems remotely. | 3,175 |
| A tool to identify and fingerprint Web Application Firewalls. | 5,347 |
| A tool that scans container images and file systems for sensitive data such as passwords and keys. | 3,146 |
| A tool used to create phishing attacks bypassing security measures | 11,084 |
| Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,642 |
| A tool designed to support security-related testing and mitigation by providing a transparent reverse proxy service with flexible configuration options. | 4,872 |