poisontap icon indicating copy to clipboard operation
poisontap copied to clipboard

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

Results 90 poisontap issues
Sort by recently updated
recently updated
newest added

i nano into the backdoor.html etc and there is nothing there whatsoever. the files are completely empty. what have i done wrong? this has happened to me on both my...

Hi, I installed everything so far and getting the following errors: > /home/pi/poisontap/pi_startup.sh: 8: cd: can't cd to /sys/kernel/config/usb_gadget/ ln: failed to create symbolic link ‘configs/c.1/acm.usb0’: File exists ln: failed...

This project is super neat and I'd love for people to actually be able to use it.

I'm trying to get poisontap to work on my RPZ, and the installation went fine with no problems at all. I tried plugging it into my computer to see if...

Hello, I didnt understand something, I know that Poisontap is works good by capturing non-HSTS website's cookies, I tried to reinject the cookie captured by poisontap on another pc by...

Hi, I tried to add the code proposed by samyk in https://github.com/samyk/poisontap/issues/29#issuecomment-263472410 without much luck. I tried changing the first script under backdoor.html with that code. I think the websocket...

Sat May 27 2017 01:59:30 GMT+0200 (CEST) HTTP server. URL / requested. Sat May 27 2017 02:03:38 GMT+0200 (CEST) HTTP server. URL / requested. Sat May 27 2017 02:03:39 GMT+0200...

Currently, I have my backend_server.js file running on one computer on port 1337. I have poison tap pluged into another computer on the same network and have changed all of...

I did the normal setup but without the persistent backdoor but for some reason it wont show up as a Ethernet device on my mac but it does on my...

Hello, first excuse my english please. Everything is working, except the part that the client has to open a Websocket. I replaced in bot filed YOUR.DOMAIN with my public IP...