Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.
Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe project.
SensePost's patches to hostapd for rogue access points. First presented at Defcon 22
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them
forked from NoobieDog/Skype-Maltego-Client
A set of local skype transforms for Maltego to utilise Skype and search the directory