Steal All Browser Credentials Via BasUSB Attack In 5 Seconds.
☆63Apr 9, 2022Updated 3 years ago
Alternatives and similar repositories for BadUSB-Browser
Users that are interested in BadUSB-Browser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Wifi enabled USB backdoor☆42Nov 13, 2016Updated 9 years ago
- Bad USB collections with malicious firmware☆75Jan 10, 2015Updated 11 years ago
- Bad USB payload attack☆14Aug 29, 2021Updated 4 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a PEN testing script for the rubber ducky that grabs the users login passwords, they will need to be decrypted using NTML method☆21Aug 2, 2021Updated 4 years ago
- Cool USB ducky scripts - Not encoded☆20Sep 30, 2022Updated 3 years ago
- This script allows you to steal some informations from a computer.☆210Feb 8, 2025Updated last year
- BadUSB - Intercept TCP traffic via USB Armory☆15Sep 7, 2016Updated 9 years ago
- This script allows you to inject an invisible keylogger thanks to a Bad USB.☆149Sep 30, 2023Updated 2 years ago
- Scrape credit card information from www.finder.com.au.☆23Feb 24, 2018Updated 8 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Feb 20, 2022Updated 4 years ago
- Some scripts for Pwnagotchi☆21Jul 21, 2020Updated 5 years ago
- ☆11May 6, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- I definitely don't understand the 'dot' concept☆38Updated this week
- powershell script and a rubber ducky payload to grab wifi password from computer.☆108Aug 3, 2022Updated 3 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆92Sep 30, 2023Updated 2 years ago
- 神器獬廌-CobaltStrike综合框架☆10Oct 15, 2022Updated 3 years ago
- A PEN testing script to demonstrate how quickly a reverse shell can be created with the rubber ducky☆17Jun 25, 2022Updated 3 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Oct 27, 2017Updated 8 years ago
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆53Nov 23, 2022Updated 3 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated last month
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A single-user database for Mac and iOS that provides multi-client synchronization using cloud storage☆12Dec 23, 2017Updated 8 years ago
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- These are my Scripts i use regulary for my Pwnagotchi and or other CyberSec related stuff.☆30Nov 28, 2019Updated 6 years ago
- wifi-grabber for Flipper☆123Apr 15, 2022Updated 3 years ago
- Turn ordinary USB drives into Bad USBs☆53Sep 18, 2017Updated 8 years ago
- A Reverse Incremental Backup Script for RClone with support for Windows/Linux/Mac with Volume Shadow Copy (VSS) and email report.☆12Feb 3, 2020Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- My personnal notes on the P4wnP1☆18Feb 18, 2024Updated 2 years ago
- This code is designed to be used with the Macchina M2 (Arduino Due based). It uses OBD PID requests to run the gauge cluster in the Pors…☆12Feb 27, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆55Apr 27, 2023Updated 2 years ago
- Browser In The Browser (BITB) attack is a sophisticated phishing and hard to detect.☆50Dec 15, 2023Updated 2 years ago
- Python bindings for libgbinder☆15Feb 3, 2026Updated last month
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆35Sep 19, 2023Updated 2 years ago
- ☆12Aug 3, 2020Updated 5 years ago
- NetHunter Kernel for the OnePlus 7 Series based on DragonHeart Kernel☆18Jun 15, 2024Updated last year
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆19May 12, 2023Updated 2 years ago