Malwarekid python BadUSB payload encoder for generating powershell script in bas64
☆22Nov 6, 2024Updated last year
Alternatives and similar repositories for BadUSB-Payload-Encoder
Users that are interested in BadUSB-Payload-Encoder are comparing it to the libraries listed below
Sorting:
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Jul 18, 2024Updated last year
- Webanator: Webcam scraper written in python that will scrape any countries web cameras.☆23Jan 10, 2026Updated 2 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- ☆13Nov 27, 2020Updated 5 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 4 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆69Jul 25, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆43Jun 30, 2024Updated last year
- ☆11Jul 19, 2023Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- light weight dos attack tool to attack to a single port to any network.☆31May 30, 2023Updated 2 years ago
- A vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to…☆14Dec 13, 2024Updated last year
- WiFi Cha0s t00lkit☆80Mar 4, 2026Updated 2 weeks ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- A couple of methods to keep your Glitch projects online 24/7.☆12Mar 25, 2023Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆31May 7, 2024Updated last year
- This is a website penetration testing tool for testing webdav server vulnerabilities.☆41Dec 13, 2024Updated last year
- ☆20Mar 14, 2025Updated last year
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆16Aug 20, 2025Updated 6 months ago
- This is a multipurpose tool which is useful in networking or network hacking.☆86Apr 15, 2023Updated 2 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆13Nov 16, 2023Updated 2 years ago
- ☆19Nov 19, 2024Updated last year
- BuyBot is a web scraper and product purchase tool.☆13Nov 30, 2020Updated 5 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- A guide to using The State Decoded, whether deploying a site or using the data from one.☆13Apr 21, 2017Updated 8 years ago