98057 / DuckyTailsLinks
DuckyTails is a interpreter that runs Ducky Scripts from any pendrive. You don't need a USB Rubber Ducky
☆12Updated 7 years ago
Alternatives and similar repositories for DuckyTails
Users that are interested in DuckyTails are comparing it to the libraries listed below
Sorting:
- A simple windows batch script intended to look like an FBI security warning, while stealing their data onto a USB.☆10Updated 3 years ago
- Make a bad usb out of any USB drive☆21Updated 7 years ago
- ☆16Updated 7 years ago
- Ducky Script for Arduino Leonardo Mini & Arduino Uno + Payload to Arduino Converter☆34Updated 7 years ago
- Build your own WiFi Pineapple, with Resin.io and a raspberry pi☆54Updated 8 years ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆40Updated 4 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆27Updated 5 years ago
- A python web application compliment to py80211 which allows you to visualize the airwaves around you with your web browser.☆15Updated 11 years ago
- Portable Hacking Machine with Raspberry Pi☆89Updated 6 years ago
- Wifi enabled USB backdoor☆41Updated 9 years ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆69Updated 10 years ago
- Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.☆71Updated 5 years ago
- 📲 Forward SMS and calls from any SIM card to Slack.☆31Updated 3 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Using Social Engineering To Obtain WiFi Passwords☆102Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as …☆16Updated this week
- wifi attacks suite☆59Updated 5 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- WiFi-Jammer/DoS toolset☆61Updated 5 years ago
- Hak5Gear Payloads, tutorials☆12Updated 8 years ago
- Automated victim-customized phishing attacks against Wi-Fi clients☆72Updated 9 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- Bramble is a hacking Open source suite.☆84Updated 6 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆82Updated 5 years ago
- KALI LINUX : WINDOWS SUBSYSTEM FOR LINUX☆76Updated 2 years ago
- Exploit toolkit☆58Updated 4 years ago
- Steal xfinity-comcast subscriber credentials.☆35Updated 10 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago