Shubhamvis98 / badbtView external linksLinks
Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Pro
☆13Nov 30, 2025Updated 2 months ago
Alternatives and similar repositories for badbt
Users that are interested in badbt are comparing it to the libraries listed below
Sorting:
- Scripts for switching to monitor mode on devices with Qualcomm drivers☆36Jan 22, 2020Updated 6 years ago
- An official clone of Android's NetHunter app for GNU/Linux Operating Systems and Phones. Initially built for PinePhone.☆85Oct 2, 2025Updated 4 months ago
- Description: The Windows Recon Toolkit is an advanced, automated reconnaissance payload designed for use with USB Rubber Ducky or compati…☆15Jun 22, 2025Updated 7 months ago
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 5 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 13 years ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆10Nov 25, 2025Updated 2 months ago
- Token Drop in Real World☆11Oct 27, 2021Updated 4 years ago
- Simple Auto WPS Pixie Dust Attack script for walking (using Wifite2)☆12Dec 22, 2019Updated 6 years ago
- Nethunter kernel for Exynos7870 devices. works on both OneUi_Pie and Treble_Q_arm64 a only.☆10Dec 19, 2020Updated 5 years ago
- Manga Reading App☆11May 21, 2025Updated 8 months ago
- A collection of tools for android devices to test the security of networks. FOR EDUCATIONAL PURPOSES ONLY!☆50Nov 23, 2014Updated 11 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Hack vulnerable Wi-Fi networks using Termux (rooted)☆13Oct 11, 2023Updated 2 years ago
- Ferramenta para busca automática de sites da Rede Onion☆10Mar 31, 2020Updated 5 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- Codes and notebooks related to generating homophilic networks and their properties☆12Jun 4, 2021Updated 4 years ago
- Legacy Rucky Binaries☆10Feb 11, 2020Updated 6 years ago
- The Hypra cryptocurrency.☆11May 2, 2024Updated last year
- Ego Graph Analysis on Social Media.☆14May 19, 2023Updated 2 years ago
- The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It…☆14Feb 27, 2025Updated 11 months ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- App to sync pocket operator devices☆13Feb 8, 2023Updated 3 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- This repository is created to share the solutions of past year questions of Fundamentals of Programming Course of CSEDU.☆11Dec 3, 2023Updated 2 years ago
- Monetha: Decentralized Reputation Framework☆16Oct 21, 2019Updated 6 years ago
- Sharer developed in VB.NET framework can turn a Windows notebook equipped with a shareable wireless network card into a WiFi transmitter;…☆20Apr 11, 2025Updated 10 months ago
- On how to pick your random generator wiseley for Ethereum Contracts.☆13Jul 25, 2016Updated 9 years ago
- FOMU keystroke injector☆12Aug 7, 2023Updated 2 years ago
- Collection of scripts for reversing Qualcomm Hexagon baseband / modem firmware☆13Jun 21, 2023Updated 2 years ago
- A Kernel based root solution for Android☆15Feb 2, 2026Updated last week
- ☆15May 27, 2025Updated 8 months ago
- POC of a decentralized application (dApp) to enhance trust in agency-client relationships using blockchain. It enables trustless payments…☆15Jan 29, 2026Updated 2 weeks ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Custom Firmware for DSTIKE Monster V5 based on (Official Firmware) made by SpaceHuhn☆14Apr 17, 2024Updated last year
- Learned User Representations in Online Social Networks (Twitter) using Temporal Dynamics of Information Diffusion.☆10Oct 15, 2018Updated 7 years ago
- Hijacker for Linux Phones☆17Jul 16, 2025Updated 6 months ago
- 🛠️ ASIMOV Command-Line Interface (CLI).☆17Updated this week