GamehunterKaan / BadUSB-Meterpreter
Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.
☆16Updated 2 years ago
Alternatives and similar repositories for BadUSB-Meterpreter:
Users that are interested in BadUSB-Meterpreter are comparing it to the libraries listed below
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆15Updated 4 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- WebHook for Red Team☆24Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆35Updated 2 years ago
- Repository of tools used in my blog☆50Updated 9 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- A lightweight ducky script generator written in python.☆30Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated last year
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- Windows Keylogger in C++☆17Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆9Updated 3 years ago
- Simple script to bulk check if IPs match networks☆11Updated 3 years ago
- Payload delivery via URL and some social engineering.☆17Updated 6 months ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12Updated last year
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆16Updated 5 years ago
- Steal telegram session Bypass 2fa☆16Updated 2 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago