dagonis / QuantumDuck
Turn Ducky Scripts into QMK ready SEND_STRING() macros
☆18Updated 5 years ago
Alternatives and similar repositories for QuantumDuck:
Users that are interested in QuantumDuck are comparing it to the libraries listed below
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 weeks ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆40Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆52Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Scapy packet fragment reassembly engines☆34Updated 4 years ago
- ☆11Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Repository of studies and research data☆38Updated 2 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- ☆12Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 6 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Corelight@Home script☆40Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- Various components we use in labs☆10Updated 4 years ago
- Random files such as wordlists which maybe be useful for playing our game☆22Updated 6 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆68Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- An analytical framework for network traffic and behavioral analytics☆22Updated last year