gomugomuguru / Steal-User-identity-through-USB
Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email
☆69Updated 6 years ago
Alternatives and similar repositories for Steal-User-identity-through-USB:
Users that are interested in Steal-User-identity-through-USB are comparing it to the libraries listed below
- Exploits USB HID to steal passwords saved in Google Chrome☆67Updated 7 years ago
- A USB phishing evaluation platform☆44Updated 9 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆96Updated 7 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆95Updated 8 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆225Updated 6 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated 3 weeks ago
- Dogma V1.5.3☆28Updated 5 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 9 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- ☆27Updated 2 years ago
- List of RAT's For android. To get any support on them contact t.me/efxtv☆43Updated 3 months ago
- ⛤Keylogger Generator for Windows written in Python⛤☆51Updated last year
- Make a Fake wireless access point aka Evil Twin....Easily!!☆66Updated last year
- Hacking with PasteJacking technique☆21Updated 9 months ago
- Rogue access point tool.☆59Updated 2 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆43Updated 8 months ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆16Updated 4 years ago
- 📦 Wireless Attacks Tools 🕷️☆65Updated last year
- Anubis 7.0☆25Updated 6 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆41Updated last year
- A Simple Script For SSH BruteForce☆36Updated last year
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆31Updated 2 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago
- A blue-team tool, creates a list of USB-Rubber-Ducky instructions.☆49Updated 5 years ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆70Updated last year
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago