skyw4tch3r / PoorMan-s-Rubber-DuckyView external linksLinks
Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY
☆12Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for PoorMan-s-Rubber-Ducky
Users that are interested in PoorMan-s-Rubber-Ducky are comparing it to the libraries listed below
Sorting:
- this is a repository for blooket hacks on my youtube channel, Dog-tp6be SUBSCIRBE!☆50May 18, 2024Updated last year
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 5 months ago
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆24Feb 1, 2026Updated 2 weeks ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- ☆13Feb 25, 2023Updated 2 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 2 months ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- ☆12Oct 19, 2024Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- P Ghost (IPG) is a powerful Bash-based tool for network scanning and OSINT (Open Source Intelligence). It allows users to detect connecte…☆10Feb 16, 2025Updated last year
- JavaScript video to ASCII converter using WebRTC.☆11Apr 1, 2015Updated 10 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- OSCP preparation☆12Sep 18, 2025Updated 4 months ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- ☆12Apr 5, 2025Updated 10 months ago
- ☆11Dec 18, 2018Updated 7 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Jan 2, 2019Updated 7 years ago
- Lunar Lander clone using OpenGL☆15Mar 22, 2023Updated 2 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Collection of antivirus bypass techniques☆12Nov 20, 2023Updated 2 years ago