furkan-enes-polatoglu / RaspberryPico-as-a-RubberDucky
☆10Updated last year
Alternatives and similar repositories for RaspberryPico-as-a-RubberDucky
Users that are interested in RaspberryPico-as-a-RubberDucky are comparing it to the libraries listed below
Sorting:
- Advanced professional graphical osint toolset with The Hive Remastered☆40Updated 10 months ago
- ☆23Updated 9 months ago
- ProxyHarvester is a bash script designed to scrape, deduplicate, and test SOCKS5 proxies from a variety of sources. Whether you're a deve…☆13Updated last year
- Advance mitm attack using fake access point☆131Updated 2 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆117Updated 3 years ago
- ☆64Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆187Updated last month
- Reports of cyber threat intelligence☆13Updated 2 years ago
- ☆148Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 6 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆58Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆17Updated last year
- ☆122Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆71Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆48Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 8 months ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆174Updated 9 months ago
- GUI Osint Framework with Kali Linux☆150Updated 2 years ago
- This script allows you to manage VPN configurations with ease. It fetches VPN configurations from VPNBook and connects to your selected V…☆14Updated 9 months ago
- POC | Steal user WhatsApp information/data☆63Updated last week
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆100Updated last year
- Automated exploit scanner for cameras on the internet☆192Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- OSINT Framework : A python based Open Source Intelligence CLI framework similar to Metasploit.☆170Updated last month
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆72Updated last year
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆14Updated last month
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago