FLOCK4H / NeoDucky
Rubber Ducky powered by NeoKey
☆22Updated 8 months ago
Alternatives and similar repositories for NeoDucky:
Users that are interested in NeoDucky are comparing it to the libraries listed below
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 2 weeks ago
- Pentesting Suite☆20Updated 8 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆22Updated 7 months ago
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆11Updated last week
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆18Updated 2 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated last year
- Modular framework to exploit UPS devices☆63Updated last year
- Crack passwords with Hashcat using a Discord Bot.☆23Updated last year
- Our fork of Iceman's fork for Proxmark III☆15Updated 2 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆38Updated 2 weeks ago
- Passworld is a fully customizable wordlist generator☆14Updated 5 months ago
- LNK-Dropper Builder☆19Updated 5 months ago
- Short Programs For Spreading Malware☆15Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- ☆20Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 7 months ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 6 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆17Updated 2 years ago
- GitHub CVE Repository Hunt☆18Updated 6 months ago
- Mass bruteforce authentication of common services with common credentials.☆45Updated last year
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆16Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆17Updated last year