Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY
☆12Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for PoorMan-s-Rubber-Ducky
Users that are interested in PoorMan-s-Rubber-Ducky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- shootenemy.py is a script that you can use object detection for sending mouse movements to an Arduino running the i2c_mouse_move.ino.☆11Jan 31, 2022Updated 4 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Appointment Scheduling Nodes.js Backend and Google Calendar API☆19Dec 11, 2022Updated 3 years ago
- this is a repository for blooket hacks on my youtube channel, Dog-tp6be SUBSCIRBE!☆55May 18, 2024Updated last year
- Development of an autonomous arduino RC car controlled by an android app through bluetooth☆13Jul 22, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- JavaScript video to ASCII converter using WebRTC.☆11Apr 1, 2015Updated 10 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- 😈 Hardware USB keylogger project with Arduino.☆17Feb 2, 2017Updated 9 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Lunar Lander clone using OpenGL☆15Mar 22, 2023Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Physical aimbot for a variety[ish] of games including Osu! and Valorant☆19Jul 14, 2021Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- The Open Tor Botnet (ZIB)☆34Aug 14, 2015Updated 10 years ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Flipper Zero Badusb commands for Samsung devices☆11Sep 25, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Start a rogue access point with no effort, with support for hostapd, airbase, sslstrip, sslsplit, tcpdump builtin☆16Mar 8, 2016Updated 10 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆27Dec 11, 2020Updated 5 years ago
- Forensic analysis tool useful in backwards computing information from next-generation sequencing data.☆11Jan 20, 2026Updated 2 months ago
- The Keylogger is able to capture all the keystrokes using system hooks. In addition to this, it is also able to put them into a file, enc…☆62Apr 22, 2018Updated 7 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- ☆17Jun 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- xtrlock mod to piggyback commands.☆31Jan 27, 2017Updated 9 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Jan 2, 2019Updated 7 years ago
- Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking…☆11Aug 23, 2020Updated 5 years ago
- GPU keylogger PoC by Team Jellyfish☆28Aug 15, 2023Updated 2 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago