#夺旗赛 (CTF) 和网络安全资源#The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
翻译 - 瑞士军刀可用于802.11,BLE和以太网侦察和MITM攻击。
Exploitation Framework for ATtiny85 Based HID Attacks
HID attack payload generator for Arduinos
Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powers...
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy
Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack
Arduino (Teensy) Based HID Attacks with Metasploit Modules
MG community edition is an open source pentesting tool to generate payloads for HID attacks.
HID attacks over Internet
Universal and Transferable Attacks on Aligned Language Models
Arduino project to convert wired USB HID device to Bluetooth (pipes USB HID reports out through a Bluetooth HID module)
dkms-hid-nintendo
Bring enhanced HID functions to your Arduino!
翻译 - 为您的Arduino带来增强的HID功能!
MCP2221 HID Library
USB / HID windows helper library
golang HID API implementation
Azure and AWS Attacks
BadUSB 2.0 USB-HID MiTM POC
Keylogger for mac written in Swift using HID