poisontap

Computer Exploit

Exploits a locked computer to install a persistent backdoor and expose internal network resources.

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

GitHub

6k stars
334 watching
994 forks
Language: JavaScript
last commit: about 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
opennhp/opennhp A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers 13,520
manisso/fsociety A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment 10,698
rogandawes/p4wnp1 A customizable USB attack platform utilizing a low-cost single-board computer for remote shell access and device control. 4,069
owasp/nettacker Automated tool for identifying vulnerabilities and gathering information about network services and systems. 3,700
pi-hole/pi-hole A software solution to block unwanted internet content by intercepting DNS queries at the network level. 49,492
diafygi/webrtc-ips A tool to obtain users' local and public IP addresses via WebRTC STUN requests 3,437
jofpin/trape A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks 8,157
klzgrad/naiveproxy A system designed to disguise and protect internet traffic from censorship and surveillance by leveraging Chrome's network stack 6,775
liamg/traitor A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems 6,735
hackerschoice/thc-tips-tricks-hacks-cheat-sheet A collection of tips and tricks for using Linux shell scripting and SSH techniques to gain access and manipulate systems remotely. 3,175
enablesecurity/wafw00f A tool to identify and fingerprint Web Application Firewalls. 5,347
deepfence/secretscanner A tool that scans container images and file systems for sensitive data such as passwords and keys. 3,146
kgretzky/evilginx2 A tool used to create phishing attacks bypassing security measures 11,084
stamparm/maltrail Detects and analyzes malicious traffic patterns to identify potential security threats. 6,642
drk1wi/modlishka A tool designed to support security-related testing and mitigation by providing a transparent reverse proxy service with flexible configuration options. 4,872