redteamsecuritytraining / PlugBot-PlugLinks
The "bot" component of the PlugBot project
☆277Updated 3 years ago
Alternatives and similar repositories for PlugBot-Plug
Users that are interested in PlugBot-Plug are comparing it to the libraries listed below
Sorting:
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- ☆253Updated 9 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Updated 8 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- The Official LAN Turtle Module Repository☆346Updated 10 months ago
- Run Hak5 Bash Bunny scripts on a raspbery pi☆246Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 7 years ago
- A basic Duckyscript to Arduino converter☆62Updated 6 years ago
- HID attack payload generator for Arduinos☆165Updated last year
- Prevent RubberDucky (or other keystroke injection) attacks☆528Updated last year
- Web Sight Docker Deployment☆122Updated 8 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- All the Malduinos!☆212Updated 3 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- The official Wiki for the Bash Bunny☆210Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Updated 8 years ago
- Encoding Tools for Rubber Ducky☆443Updated last year
- Python port of infamous duckencoder for RubberDucky☆144Updated 2 years ago
- Simple DuckyScript to Arduino C converter.☆367Updated 4 years ago
- The WiFi Pineapple Wiki☆260Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 4 months ago
- ☆200Updated 3 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- A malicious captive wifi portal☆149Updated 5 years ago
- ☆167Updated 6 years ago
- Malicious USB☆175Updated 2 years ago
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆337Updated 6 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago