Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
☆43Dec 9, 2020Updated 5 years ago
Alternatives and similar repositories for KeySpark
Users that are interested in KeySpark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Code for programming a Digispark to download and run a program.☆12Jul 10, 2017Updated 8 years ago
- A digispark supported keylogger.Only worked on W10.☆12Jul 11, 2022Updated 3 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Python Script Obfuscator☆10Nov 20, 2014Updated 11 years ago
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- https://github.com/Swiftonsecurity/sysmon-config☆10Nov 8, 2018Updated 7 years ago
- Secure network block device☆11Dec 29, 2016Updated 9 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated last month
- ☆17Mar 21, 2019Updated 7 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- Harden and secure your Debian or Debian based OS, with this simple zero-configuration Debian bash script☆18May 30, 2022Updated 3 years ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Virtual File System supporting Different Functions (adding , copying from and to Hard Disk , Deleting Files and Folders)☆11Jul 13, 2017Updated 8 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago