FLOCK4H / NeoDucky
Rubber Ducky powered by NeoKey
☆22Updated 9 months ago
Alternatives and similar repositories for NeoDucky:
Users that are interested in NeoDucky are comparing it to the libraries listed below
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- LNK-Dropper Builder☆21Updated 6 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆23Updated 8 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆11Updated last month
- hiding in plain sight: part 2☆44Updated 8 months ago
- ☆9Updated 3 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 7 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 8 months ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated last month
- Crack passwords with Hashcat using a Discord Bot.☆24Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆30Updated last month
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 8 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆43Updated last month
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Another vulnerability scanner☆19Updated 2 weeks ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆14Updated 6 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago