furkan-enes-polatoglu / RaspberryPico-as-a-RubberDuckyLinks
☆10Updated 2 years ago
Alternatives and similar repositories for RaspberryPico-as-a-RubberDucky
Users that are interested in RaspberryPico-as-a-RubberDucky are comparing it to the libraries listed below
Sorting:
- ☆22Updated last year
- Advanced professional graphical osint toolset with The Hive Remastered☆39Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆200Updated 6 months ago
- ☆66Updated 2 years ago
- simple script to solve the problem of internet connection after ParrotOS-Anonsurf☆15Updated 3 years ago
- ProxyHarvester is a bash script designed to scrape, deduplicate, and test SOCKS5 proxies from a variety of sources. Whether you're a deve…☆14Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- Hackcctv☆205Updated 4 months ago
- Chista | Open Threat Intelligence Framework☆59Updated last year
- Automated exploit scanner for cameras on the internet☆204Updated last year
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆474Updated last year
- Recolored Kali Linux wallpapers☆126Updated last year
- ☆123Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆62Updated 4 years ago
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆284Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- Leak the IP address and Geolocation of target whatsapp user☆157Updated 4 years ago
- This script allows you to manage VPN configurations with ease. It fetches VPN configurations from VPNBook and connects to your selected V…☆14Updated 4 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 4 months ago
- Reports of cyber threat intelligence☆13Updated 2 years ago
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆33Updated 8 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆185Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated last month
- Osint tool for track ip adress☆224Updated 2 months ago
- Getting Target Browser information by using a URL☆35Updated 10 months ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆33Updated 4 months ago
- hulk is a ddos attacking tool☆164Updated 10 months ago
- Python scripts and tools built during my learning journey☆29Updated 2 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆98Updated 2 years ago
- XSS vulnerability scanner written in Python☆16Updated 2 years ago