PrettyBoyCosmo / PrettyBoyCosmoLinks
☆17Updated last month
Alternatives and similar repositories for PrettyBoyCosmo
Users that are interested in PrettyBoyCosmo are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆28Updated 4 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆92Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆177Updated 11 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆168Updated 7 months ago
- ☆124Updated last year
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 4 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆52Updated last year
- Automate installation of extra pentest tools on Kali Linux☆61Updated 4 years ago
- WiFi keylogger with Micro SD slot, based on the Atmega32U4 microcontroller and the ESP32-PICO module☆247Updated this week
- BadUSB cable based on Attiny85 microcontroller with data line enabled.☆235Updated 9 months ago
- Evil Crow Cable Pro device☆132Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated last year
- Repository for Ducky payloads☆43Updated 2 months ago
- ☆21Updated 2 years ago
- Stuff about it-security that might be good to know☆24Updated 6 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Updated 8 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- 🤖 The Modern Port Scanner 🤖☆21Updated 4 years ago
- The Official Key Croc Payload Repository☆221Updated 9 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆420Updated 3 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- Xfinity / Comcast Wordlist Generator☆76Updated 2 years ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆47Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆400Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated last week