Tsujimar / tsuki-sploitLinks
A USB-based script for Ethical hacking with multiple attacks
☆49Updated 2 years ago
Alternatives and similar repositories for tsuki-sploit
Users that are interested in tsuki-sploit are comparing it to the libraries listed below
Sorting:
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆60Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- Stuff about it-security that might be good to know☆23Updated 6 years ago
- capNcook - a dark web exploration tool☆84Updated last year
- Pentesting Suite☆54Updated 5 months ago
- This is an application I am developing to automatically convert powershell scripts into ready to use Ducky scripts☆231Updated 3 years ago
- Xfinity / Comcast Wordlist Generator☆73Updated 2 years ago
- Searching the TrashPanda OSINT bot API to check if your email/domain or password was leaked or not☆64Updated 4 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆106Updated last year
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆52Updated 6 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Bash Script to automate install of AWUS036ACH Wireless Alfa drivers instead of manually running every command. Works on Kali Linux/Debian…☆58Updated 7 months ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆92Updated 2 years ago
- All my ducky script for my malduino☆25Updated 4 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆101Updated 8 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆105Updated 2 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 6 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆107Updated 2 years ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆43Updated 7 months ago
- This script allows you to take control of a PC with a reverseShell attack.☆55Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated 2 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆69Updated 8 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆395Updated 2 years ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆99Updated last year
- Fun scripts for the WiFi Pineapple Mark VII (Module Support is Light)☆76Updated 4 years ago
- A Powerful Intruder written in Python☆21Updated 4 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆31Updated 6 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆54Updated last month