HassanShehata / KeySpark
Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
☆43Updated 4 years ago
Alternatives and similar repositories for KeySpark:
Users that are interested in KeySpark are comparing it to the libraries listed below
- Backdoor en powershell vía Telegram☆29Updated 7 years ago
- ☆13Updated 7 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Simple Karma Attack☆66Updated 4 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆33Updated 7 years ago
- python hash cracker☆52Updated 2 months ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Updated 7 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆18Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- ☆24Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Fully-featured spear-phishing toolkit - web front-end☆50Updated last week
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆0Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- A simple "ransomware" using powershell☆13Updated 3 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago