itsmehacker / Ducky-ExploitLinks
Arduino Rubber Ducky Framework
☆107Updated 6 years ago
Alternatives and similar repositories for Ducky-Exploit
Users that are interested in Ducky-Exploit are comparing it to the libraries listed below
Sorting:
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Massive arsenal of hacker tools...☆78Updated 8 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆86Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- A simple bash based metasploit automation tool!☆124Updated 2 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126Updated 7 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆159Updated 8 years ago
- Tool made to automate tasks of pentesting.☆165Updated 6 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 8 years ago
- ☆58Updated 5 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 6 years ago
- A collection of Payloads for the WHID Cactus☆55Updated 6 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆99Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 10 years ago
- Python based script for Information Gathering.☆105Updated 2 weeks ago
- Slides from my talk at ISC 2018 in Beijing 2018☆93Updated 6 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- WIreless Hacking Tools☆168Updated 12 years ago