Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy
☆145Jan 26, 2017Updated 9 years ago
Alternatives and similar repositories for Pateensy
Users that are interested in Pateensy are comparing it to the libraries listed below
Sorting:
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Dec 18, 2016Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,249Mar 9, 2020Updated 5 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Apr 13, 2017Updated 8 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆13Jan 24, 2021Updated 5 years ago
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- $10 USB Rubber Ducky Clone☆64Sep 15, 2017Updated 8 years ago
- Rubber Ducky compatible clone based on CJMCU BadUSB HW.☆299Aug 28, 2023Updated 2 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆869Aug 4, 2017Updated 8 years ago
- Python simulation of "rolljam" attacks☆18Jul 29, 2022Updated 3 years ago
- Simple DuckyScript to Arduino C converter.☆369Nov 10, 2021Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,321Jan 23, 2018Updated 8 years ago
- Interpreter that runs on an arduino, decodes and executes ducky script on a microSD card.☆299Oct 11, 2019Updated 6 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 9 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Go implementation of Bluez DBus api interfaces needed for P4wnP1☆12Dec 12, 2018Updated 7 years ago
- ROM dump of the MYK82 chip in a Fortezza Card. Successor to the Clipper Chip.☆14Jul 28, 2024Updated last year
- ☆11Jan 27, 2026Updated last month
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Malduino Elite firmware☆46May 31, 2017Updated 8 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Experiments with the Yard Stick One, replay attacks☆19Feb 13, 2017Updated 9 years ago
- Python - Human Interface Device Android Attack Framework☆47Apr 30, 2017Updated 8 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆750Sep 1, 2022Updated 3 years ago
- HID attack payload generator for Arduinos☆166Jul 8, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago