Prevent RubberDucky (or other keystroke injection) attacks
☆533Mar 1, 2024Updated 2 years ago
Alternatives and similar repositories for duckhunt
Users that are interested in duckhunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- A Python Keylogger for Windows☆47May 26, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,795Jul 27, 2024Updated last year
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆501Aug 11, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A script to test an RDP host for sticky keys and utilman backdoor.☆262Sep 12, 2016Updated 9 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 9 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,368Aug 12, 2024Updated last year
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆342Aug 14, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆1,552Apr 9, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- USB Rubber Ducky for ATTiny85☆118Oct 1, 2020Updated 5 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆823Nov 3, 2017Updated 8 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- Some of my antiUAC Scripts for Rubbber Ducky☆31Oct 22, 2020Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,266Dec 18, 2021Updated 4 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆1,756Dec 9, 2018Updated 7 years ago
- Arduino sketch to program a Malduino bad USB (lite) to download a password grabber and send the results via email☆55Jul 14, 2017Updated 8 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- All the Malduinos!☆216May 12, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,408May 5, 2021Updated 5 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 4 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,659Nov 24, 2020Updated 5 years ago
- MouseJack device discovery and research tools☆1,373Dec 19, 2017Updated 8 years ago
- DIY Arduino Wi-Fi Keylogger (Proof of Concept)☆367Jul 24, 2019Updated 6 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,453Nov 20, 2025Updated 5 months ago