dagonis / QuantumDuckLinks
Turn Ducky Scripts into QMK ready SEND_STRING() macros
☆18Updated 5 years ago
Alternatives and similar repositories for QuantumDuck
Users that are interested in QuantumDuck are comparing it to the libraries listed below
Sorting:
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- ☆39Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆95Updated 4 years ago
- ☆12Updated 2 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆26Updated 6 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆28Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Various components we use in labs☆10Updated 5 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- A list of Autopsy awesome plugins.☆75Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Corelight@Home script☆44Updated 2 years ago
- Various short scripts and tools used for Digital Forensics☆14Updated 6 months ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- ☆77Updated 3 weeks ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆72Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆35Updated 7 years ago
- Backstage Parser☆32Updated 3 years ago
- Extracts Windows user info including the password hashes☆40Updated 9 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago