A collection of Payloads for the WHID Cactus
☆55Nov 15, 2019Updated 6 years ago
Alternatives and similar repositories for WHID-Payloads
Users that are interested in WHID-Payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The USB Rubber Ducky is a discrete miniature keyboard that is disguised as a regular USB Storage Device. This page provides the payload …☆16Apr 21, 2019Updated 7 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Simple script for the WHID injector - a rubberducky wifi☆119Jul 16, 2024Updated last year
- I created this USB Rubber Ducky payload a while back and just finnished touching it up a bit. Basically what it does is download malware …☆10Feb 7, 2019Updated 7 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆20May 2, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,795Jul 27, 2024Updated last year
- Android Mobile App for Controlling WHID Injector remotely.☆214Jan 7, 2023Updated 3 years ago
- Modified version of Duckuino to convert Ducky Script for use with Devices running ESPloit(Cactus WHID)☆13Oct 11, 2017Updated 8 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆501Aug 11, 2017Updated 8 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ☆49Dec 6, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- My personnal notes on the P4wnP1☆18Feb 18, 2024Updated 2 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- BadUSB cable based on Attiny85 microcontroller with data line enabled.☆242Apr 6, 2025Updated last year
- My attempt at writing exploit POCs for various CVEs☆15Feb 8, 2020Updated 6 years ago
- Random stuff☆19May 28, 2024Updated last year
- Annabelle Ransomware, coded for fun.☆13Jul 28, 2020Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- ☆19Dec 8, 2018Updated 7 years ago
- Tested Ducky script payloads for USB Rubber Ducky☆14Nov 7, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,408May 5, 2021Updated 5 years ago
- on the road P4wnP1 ALOA menu☆160Jul 2, 2020Updated 5 years ago
- addons to manage multiple DMX fixtures☆13Feb 21, 2022Updated 4 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- An Arduino board configuration for a Nano clone with an ATmega328PB incl. Bootloader☆11Aug 12, 2020Updated 5 years ago
- A web app for chatting using Meshtastic. Can connect via 127.0.0.1:5678☆20Jul 11, 2024Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Audio-reactive lines in WebGL☆10Mar 15, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 9 years ago
- This is just a basic script that steals handshakes and cleans them this can then be used to crack them and steal wifi passwords, if you h…☆13May 21, 2017Updated 8 years ago
- AT90USB64x/128x Support for Arduino IDE☆20Jul 12, 2016Updated 9 years ago
- Bootloader for the Adafruit nRF52 Feather☆12May 16, 2019Updated 6 years ago
- These are Arduino examples for many esp8266 devkits,such as D1 mini,D1 mini pro,nodemcu and so on.☆13May 24, 2017Updated 8 years ago
- Chrome App NFC Library. JDR: Implemented NFC Forum Type 4 Tag Operation.☆13Nov 20, 2014Updated 11 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago