jamesbcook / Powershell-Reverse-Rubber-DuckyLinks
Powershell Reverse Rubber Ducky
☆56Updated 10 years ago
Alternatives and similar repositories for Powershell-Reverse-Rubber-Ducky
Users that are interested in Powershell-Reverse-Rubber-Ducky are comparing it to the libraries listed below
Sorting:
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- WPS scan and pwn tool☆69Updated 5 years ago
- Useful pentesting scripts☆83Updated 5 months ago
- USB Attack to Decrypt Wi-Fi Communications☆33Updated 9 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆67Updated 6 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆114Updated 9 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Reliable Teensy Penetration Testing Payload☆179Updated 12 years ago
- Porting the Pineapple to the Raspberry Pi☆84Updated 12 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆36Updated 9 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Unofficial Kali Documentation Project☆162Updated 10 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆144Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆57Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago