Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky
☆18Aug 11, 2018Updated 7 years ago
Alternatives and similar repositories for AndroPyDucky
Users that are interested in AndroPyDucky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 3 months ago
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 5 years ago
- Simple Penetration Testing Multitool For Beginners.☆61Dec 8, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Collection of Python Scripts☆188Nov 12, 2024Updated last year
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Tested Ducky script payloads for USB Rubber Ducky☆14Nov 7, 2020Updated 5 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- xorhunx adalah tool cryptography☆14Jun 21, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple embedded web application in Ruby for use in Android Devices☆27Sep 2, 2010Updated 15 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Spy on your friend Android App☆13Feb 13, 2017Updated 9 years ago
- ⚡ This application allows to perform more easily the adb commands☆14Dec 17, 2024Updated last year
- Huawei login page extracted from real device and modified for #Evil-twin attack☆19May 8, 2022Updated 3 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- APK repository - for Chinese developers =)☆10May 24, 2015Updated 10 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- BLACKEYE v1.5.1 UPDATES : Updated the port forwarding support to ngrok2.0 FOR ANY SUGGESTION CONTACT :@suljot_gjoka or x3rz.r on Instagra…☆17Apr 12, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago
- Remote Keyless Entry Systems☆18Mar 26, 2017Updated 9 years ago
- Application and Widget for Android allowing user to find its current public IP address☆18Sep 23, 2021Updated 4 years ago
- radiotap parser C library☆12Jul 24, 2021Updated 4 years ago
- Guide to rooting and custom firmware on Samsung Galaxy S3 i9300☆10Apr 28, 2026Updated last week
- # hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have …☆11May 9, 2021Updated 4 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- ☆17Jan 12, 2018Updated 8 years ago
- A MagSpoof build using STM32☆14Jul 27, 2020Updated 5 years ago