poisontap
Computer Exploit
Exploits a locked computer to install a persistent backdoor and expose internal network resources.
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
6k stars
334 watching
995 forks
Language: JavaScript
last commit: almost 6 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
opennhp/opennhp | A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. | 13,515 |
manisso/fsociety | A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,637 |
rogandawes/p4wnp1 | A customizable USB attack platform utilizing a low-cost single-board computer for remote shell access and device control. | 4,038 |
owasp/nettacker | Automated tool for identifying vulnerabilities and gathering information about network services and systems. | 3,618 |
pi-hole/pi-hole | A software solution to block unwanted internet content by intercepting DNS queries at the network level. | 49,206 |
diafygi/webrtc-ips | A tool to obtain users' local and public IP addresses via WebRTC STUN requests | 3,439 |
jofpin/trape | A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks | 8,116 |
klzgrad/naiveproxy | A system designed to disguise and protect internet traffic from censorship and surveillance by leveraging Chrome's network stack | 6,685 |
liamg/traitor | A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,689 |
hackerschoice/thc-tips-tricks-hacks-cheat-sheet | A collection of tips and tricks for using Linux shell scripting and SSH techniques to gain access and manipulate systems remotely. | 3,149 |
enablesecurity/wafw00f | A tool to identify and fingerprint Web Application Firewalls. | 5,296 |
deepfence/secretscanner | A tool that scans container images and file systems for sensitive data such as passwords and keys. | 3,134 |
kgretzky/evilginx2 | A tool used to create phishing attacks bypassing security measures | 10,924 |
stamparm/maltrail | Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,535 |
drk1wi/modlishka | A tool designed to support security-related testing and mitigation by providing a transparent reverse proxy service with flexible configuration options. | 4,847 |