ll3N1GmAll / Malduino_Payloads
Malduino compatible USB rubber ducky payloads
☆14Updated 5 years ago
Alternatives and similar repositories for Malduino_Payloads:
Users that are interested in Malduino_Payloads are comparing it to the libraries listed below
- ☆13Updated 7 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 8 months ago
- WebHook for Red Team☆24Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆17Updated 5 years ago
- Cyb3rpin7a Tool is keylogger when we run python file on victim pc it's work like trojan and tack screenshot in ever 5 seconds from victim…☆10Updated 4 years ago
- ☆19Updated 7 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- Simple but sharp ransomware☆34Updated 4 years ago
- Onionnux is a onionsite(DEEPNET/DARKNET) tool.It can help to idenitfy onionsite is active or onionsite server name.☆17Updated 3 years ago
- ☆19Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆13Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆17Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Development☆11Updated 3 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Temporary Webshell to Bypass 406 & Auto Delete Shell☆11Updated 2 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 6 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago