furkan-enes-polatoglu / RaspberryPico-as-a-RubberDucky
☆10Updated last year
Alternatives and similar repositories for RaspberryPico-as-a-RubberDucky:
Users that are interested in RaspberryPico-as-a-RubberDucky are comparing it to the libraries listed below
- Advanced professional graphical osint toolset with The Hive Remastered☆40Updated 9 months ago
- ☆22Updated 8 months ago
- ☆63Updated last year
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- ProxyHarvester is a bash script designed to scrape, deduplicate, and test SOCKS5 proxies from a variety of sources. Whether you're a deve…☆13Updated last year
- Videoları kare kare ayırmak için basit python3 programı. Web üzerinen bulamadım basit ama lazım oluyor.☆9Updated last year
- This script allows you to manage VPN configurations with ease. It fetches VPN configurations from VPNBook and connects to your selected V…☆14Updated 8 months ago
- Reports of cyber threat intelligence☆13Updated 2 years ago
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆13Updated 3 weeks ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆97Updated 6 months ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆99Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆68Updated last year
- OSINT Framework : A python based Open Source Intelligence CLI framework similar to Metasploit.☆170Updated 2 weeks ago
- simple script to solve the problem of internet connection after ParrotOS-Anonsurf☆15Updated 3 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 9 months ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆115Updated 3 years ago
- ☆11Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated 7 months ago
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- ☆121Updated last year
- ☆26Updated 9 months ago
- A tool for automatically change the Tor IP address over time.☆79Updated 3 weeks ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆34Updated 7 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 7 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆70Updated last year
- tryhame rooms walkthrough☆20Updated this week
- Recolored Kali Linux wallpapers☆123Updated 11 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago