Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)
☆118Dec 5, 2018Updated 7 years ago
Alternatives and similar repositories for uberducky
Users that are interested in uberducky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- decode Bluetooth Class of Device☆27Feb 17, 2014Updated 12 years ago
- Bluetooth PIN and LINK-KEY Cracker☆53May 12, 2014Updated 11 years ago
- Hackmelock Android application☆17Apr 11, 2017Updated 8 years ago
- Crack and decrypt BLE encryption☆950Aug 26, 2021Updated 4 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Get your USB Rubber Ducky up and running faster☆45Nov 18, 2017Updated 8 years ago
- [unofficial fork] RAR bruteforce cracker☆40Feb 17, 2018Updated 8 years ago
- USB bootloader for the CC1111 RF SoC (rfcat version)☆34Nov 4, 2023Updated 2 years ago
- Ubertooth host (PC) utilities for working on Windows OS.☆21Feb 28, 2026Updated last month
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Trophy list of zero-day vulnerabilities that I discovered☆11May 6, 2024Updated last year
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Sep 1, 2020Updated 5 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks…☆68Jun 23, 2022Updated 3 years ago
- Compilation of HID Scripts and Payloads for P4wnP1☆28Sep 11, 2022Updated 3 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Feb 19, 2019Updated 7 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Slides and code from "So You Want to Hack Radios", as presented by @marcnewlin and @matt-knight at ShmooCon 2017.☆75Sep 15, 2017Updated 8 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,791Jul 27, 2024Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆18Nov 5, 2021Updated 4 years ago
- Yardstick One Scripts for your RF Adventures☆18May 8, 2025Updated 10 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Smartcard APDU interception and MITM for one smartcard model☆38Mar 2, 2018Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆107Jul 27, 2016Updated 9 years ago
- the smart way to manage wpa handshakes collected by pwnagotchi☆30Oct 30, 2021Updated 4 years ago
- Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP☆408Nov 23, 2025Updated 4 months ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆66Jun 5, 2018Updated 7 years ago