DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.
☆10Apr 14, 2022Updated 3 years ago
Alternatives and similar repositories for DuckyLogger
Users that are interested in DuckyLogger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- This action checks the version tags in your repository to ensure correct semantic versioning behavior.☆13Updated this week
- Android app to perform secure deletes.☆10Feb 25, 2016Updated 10 years ago
- Terraform module to create & host static UI application in AWS S3☆26May 4, 2020Updated 5 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Run shortcuts automatically as you enter and leave locations while you use your iOS device.☆13Nov 16, 2019Updated 6 years ago
- Powershell script designed to easily let you export all your wishes from Genshin☆11Feb 9, 2022Updated 4 years ago
- ZeroNet as snap☆11Dec 4, 2020Updated 5 years ago
- ☆11Aug 11, 2016Updated 9 years ago
- Nice and powerful weather widget for Übersicht☆13Feb 22, 2021Updated 5 years ago
- Python script to track information of entered phone number☆15Dec 17, 2022Updated 3 years ago
- Real-time game translation app for Android for both language learners and casual gamers☆55Updated this week
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple app connecting Meshtastic with Telegram API☆12Sep 22, 2021Updated 4 years ago
- Twingate Kubernetes Operator allows configuring Twingate using Kubernetes assets - OSS☆48Updated this week
- A LoRaWAN Network Tester based on the M5Stack for the LoRa 868 module, compatible with TTN☆14Aug 1, 2021Updated 4 years ago
- ☆18Mar 2, 2025Updated last year
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- SSH Terminal with M5Cardputer with interactive setup for WiFi and SSH client☆19May 17, 2024Updated last year
- A stateless, open-source CRM built on Google Sheets☆36Feb 10, 2026Updated last month
- A piece of Processing code that generates Isochronic Map☆20Dec 9, 2012Updated 13 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Open-Transistor - Radio App for Android☆16Jan 5, 2023Updated 3 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Feb 16, 2022Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆16May 15, 2020Updated 5 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago