githubkuyaya / LaZassword
Password recovery payload for the BashBunny, using LaZagne.
☆12Updated 4 years ago
Alternatives and similar repositories for LaZassword:
Users that are interested in LaZassword are comparing it to the libraries listed below
- ☆26Updated 5 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆30Updated 7 years ago
- LetMeHID is a tool that generates Windows HID payloads to obtain bind or reverse access using Raspberry PI0 and P4wnP1 A.L.O.A.☆52Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- ☆52Updated 4 years ago
- A collection of Payloads for the WHID Cactus☆50Updated 5 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 10 months ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Docker images for learning wifi hacking☆66Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆47Updated 5 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆56Updated 3 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- Fully-featured spear-phishing toolkit - web front-end☆51Updated 3 months ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago