PrettyBoyCosmo / PrettyBoyCosmoLinks
☆17Updated last week
Alternatives and similar repositories for PrettyBoyCosmo
Users that are interested in PrettyBoyCosmo are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆29Updated 4 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆92Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆57Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆61Updated 4 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆169Updated 8 months ago
- 🤖 The Modern Port Scanner 🤖☆21Updated 4 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- ☆125Updated last year
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 5 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆225Updated 2 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆20Updated 3 years ago
- Evil Crow Cable Pro device☆135Updated 3 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- WiFi keylogger with Micro SD slot, based on the Atmega32U4 microcontroller and the ESP32-PICO module☆253Updated 3 weeks ago
- Stuff about it-security that might be good to know☆23Updated 6 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆14Updated 6 years ago
- ☆17Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆53Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆77Updated 2 years ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Updated 8 years ago
- Testing POC for use cases☆25Updated last year
- The Official Key Croc Payload Repository☆224Updated 3 weeks ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆401Updated 2 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆70Updated 8 years ago
- A Powerful Intruder written in Python☆21Updated 4 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆55Updated 2 years ago
- BadUSB cable based on Attiny85 microcontroller with data line enabled.☆237Updated 10 months ago