drapl0n / DuckyLoggerView external linksLinks
DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.
☆10Apr 14, 2022Updated 3 years ago
Alternatives and similar repositories for DuckyLogger
Users that are interested in DuckyLogger are comparing it to the libraries listed below
Sorting:
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Feb 16, 2022Updated 3 years ago
- Hands-on microservices course by Julio Casal in freeCodeCamp.org (with .NET 6)☆10Aug 29, 2022Updated 3 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 1, 2026Updated last week
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago
- The goal of this project is to provide the terraform's templates for the openwebinars's course☆10Oct 25, 2017Updated 8 years ago
- Powershell script designed to easily let you export all your wishes from Genshin☆12Feb 9, 2022Updated 4 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- ☆11Aug 11, 2016Updated 9 years ago
- Phone number information lookup, validation, carrier name, geo and timezone infos, Verify phone number, validate format, checking carrie…☆16Nov 22, 2025Updated 2 months ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- frontend for the open source project inspired in http://indianswhodesign.in, made to expose all the developers from the Dominican Republi…☆10Jul 4, 2021Updated 4 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- I created this USB Rubber Ducky payload a while back and just finnished touching it up a bit. Basically what it does is download malware …☆10Feb 7, 2019Updated 7 years ago
- Ethereum smart contracts that have been used during successful ICOs☆11Feb 9, 2021Updated 5 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- This action checks the version tags in your repository to ensure correct semantic versioning behavior.☆13Updated this week
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- Track you Ethereum wallet, get notified while any transactions appeared with Line or Discord, supported normal/internal/erc20/erc721 txns…☆15Dec 17, 2023Updated 2 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Simple app connecting Meshtastic with Telegram API☆10Sep 22, 2021Updated 4 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆10Dec 5, 2019Updated 6 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- ☆10Aug 31, 2021Updated 4 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Step by step guide to setup Ethereum POA private chain☆12Feb 11, 2019Updated 7 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Herramientas que utilizamos en WSH☆18Sep 30, 2020Updated 5 years ago