redteamsecuritytraining / PlugBot-C2C
This is the Command & Control component of the PlugBot project
☆102Updated 3 years ago
Alternatives and similar repositories for PlugBot-C2C:
Users that are interested in PlugBot-C2C are comparing it to the libraries listed below
- The "bot" component of the PlugBot project☆274Updated 3 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- A basic Duckyscript to Arduino converter☆61Updated 5 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆60Updated 6 years ago
- Stargate☆94Updated 8 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- Porting the Pineapple to the Raspberry Pi☆83Updated 11 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- ☆51Updated 12 years ago
- Useful pentesting scripts☆83Updated last month
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆435Updated 8 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆34Updated 6 months ago
- Phishing Scenarios Used for Phishing Frenzy☆207Updated 5 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆142Updated 8 years ago
- Reliable Teensy Penetration Testing Payload☆178Updated 12 years ago
- ☆220Updated 9 months ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆258Updated 8 years ago