Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.
☆53Jun 8, 2019Updated 6 years ago
Alternatives and similar repositories for BlueDucky
Users that are interested in BlueDucky are comparing it to the libraries listed below
Sorting:
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆17Jan 24, 2024Updated 2 years ago
- Complete React application of Numspy API.☆14Jul 31, 2020Updated 5 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- Install zsh on termux☆12Dec 30, 2024Updated last year
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Unlimited Call - Text Bombing Tool☆13Nov 11, 2021Updated 4 years ago
- Flash Force is a parallelism-based multiprocess hash cracking tool written in Python. Achieve GOD SPEED while cracking the hash with full…☆25Jun 19, 2025Updated 8 months ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- A repository for iOS BootROM exploits as used by Checkm8 and other iOS Bypass service providers.☆28Sep 8, 2023Updated 2 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- File Clonnig☆12Apr 18, 2024Updated last year
- Termux üçün Hacking Tool / Hacking Tool for Termux☆30Nov 20, 2023Updated 2 years ago
- konboot iso and Sticky key backddoor.☆23Apr 17, 2019Updated 6 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Tools Hack Fb terbaru 2020 by MBEWLEGS☆10Dec 28, 2021Updated 4 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- Fast command crack fb☆12Apr 22, 2022Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- ☆10Jun 24, 2022Updated 3 years ago
- Protection from saycheese.☆10Aug 25, 2021Updated 4 years ago
- ☆10Aug 21, 2023Updated 2 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- Description: The Windows Recon Toolkit is an advanced, automated reconnaissance payload designed for use with USB Rubber Ducky or compati…☆16Feb 23, 2026Updated last week
- Maltego transform for hunter.io☆40Apr 28, 2021Updated 4 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- Automated 2009 Account Cracker☆12Mar 24, 2022Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- ☆10Aug 13, 2022Updated 3 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago