Prevent RubberDucky (or other keystroke injection) attacks
☆530Mar 1, 2024Updated 2 years ago
Alternatives and similar repositories for duckhunt
Users that are interested in duckhunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- A Python Keylogger for Windows☆47May 26, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,791Jul 27, 2024Updated last year
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A script to test an RDP host for sticky keys and utilman backdoor.☆263Sep 12, 2016Updated 9 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,361Aug 12, 2024Updated last year
- A rogue-USB-device defeat program for Windows.☆188Jun 22, 2022Updated 3 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- USB Rubber Ducky for ATTiny85☆117Oct 1, 2020Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆1,538Mar 23, 2023Updated 3 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- Some of my antiUAC Scripts for Rubbber Ducky☆31Oct 22, 2020Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆83Jan 29, 2016Updated 10 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,267Dec 18, 2021Updated 4 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆1,736Dec 9, 2018Updated 7 years ago
- Arduino sketch to program a Malduino bad USB (lite) to download a password grabber and send the results via email☆54Jul 14, 2017Updated 8 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,400May 5, 2021Updated 4 years ago
- All the Malduinos!☆214May 12, 2022Updated 3 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,654Nov 24, 2020Updated 5 years ago
- MouseJack device discovery and research tools☆1,370Dec 19, 2017Updated 8 years ago
- DIY Arduino Wi-Fi Keylogger (Proof of Concept)☆368Jul 24, 2019Updated 6 years ago