ESPloitV2
ESPloitV2 copied to clipboard
FingerprintUSBHost implementation to detect OS
Added FingerprintUSBHost library.
New command "GetOS:"
When you execute the command "GetOS:" in the textarea or in a payload, the file OS.txt will appear in the Exfiltrate section.
Inside that file you will find the operating system of the computer where the ESPloitV2 device is connected.
Tested with WHID Injector on Linux and Windows.
This is a local fork of ESPloitV2 since there are some PR unapproved on exploitagency/ESPloitV2 that I would like to see merged. If you have PRs and don't get approved on Corey's repo, do make them here: https://github.com/whid-injector/WHID/tree/master/ESPloitV2_whid Thanks.