A collection of Ducky Script payloads.
☆19Feb 29, 2020Updated 6 years ago
Alternatives and similar repositories for ducky-scripts-and-payloads
Users that are interested in ducky-scripts-and-payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Android Auto USB to Wifi bridge for Raspberry Pi☆21Feb 3, 2023Updated 3 years ago
- A collection of 🦆 payloads compatible with hak5-RubberDucky, FlipperZero-BadUSB & pico-ducky.☆27Mar 7, 2023Updated 3 years ago
- A simple BadKB/BadBT script that spams an iphone by spamming GUI space☆25Sep 21, 2024Updated last year
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Standalone Wireless keystroke injection attack platform for ESP32 s2/s3☆13Jun 14, 2024Updated last year
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Jul 25, 2023Updated 2 years ago
- Ducky Script is the payload language of Hak5 gear. Since its introduction with the USB Rubber Ducky in 2010, Ducky Script has grown in ca…☆12Jun 20, 2024Updated last year
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Add audio to Web images☆50Sep 9, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Oct 22, 2023Updated 2 years ago
- quick'n dirty hack to invoke ARM SMC instruction from userland through debugfs☆15Sep 4, 2016Updated 9 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Large language models (LLMs) made easy, EasyLM is a one stop solution for pre-training, finetuning, evaluating and serving LLMs in JAX/Fl…☆11Apr 26, 2023Updated 2 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 11 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- ☆13Jun 24, 2023Updated 2 years ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- one-click deepfake (face swap)☆10May 30, 2023Updated 2 years ago
- LLM Frontend for Power Users.☆12Feb 7, 2024Updated 2 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Reading and writing strings to and from MiFare tags using a Raspberry Pi and the RFID-RC522☆11Nov 11, 2020Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Some papers and exploit writeups about WebKit.☆21Feb 18, 2024Updated 2 years ago