Simple script for the WHID injector - a rubberducky wifi
☆119Jul 16, 2024Updated last year
Alternatives and similar repositories for WHID_Toolkit
Users that are interested in WHID_Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Dec 23, 2020Updated 5 years ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 3 years ago
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆471Sep 22, 2019Updated 6 years ago
- Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex☆422Feb 27, 2025Updated last year
- A collection of Payloads for the WHID Cactus☆55Nov 15, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Android Mobile App for Controlling WHID Injector remotely.☆214Jan 7, 2023Updated 3 years ago
- WPScan rewritten in Python + some WPSeku ideas☆654Jun 4, 2021Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,795Jul 27, 2024Updated last year
- Hardware/IOT Pentesting Wiki☆871Nov 9, 2025Updated 6 months ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Example packet.proxy plugins.☆22Jan 8, 2021Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- The USB Rubber Ducky is a discrete miniature keyboard that is disguised as a regular USB Storage Device. This page provides the payload …☆16Apr 21, 2019Updated 7 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,539Sep 4, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Simple DuckyScript to Arduino converter☆14Jan 14, 2019Updated 7 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,656Mar 11, 2024Updated 2 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Jan 8, 2023Updated 3 years ago
- Migrate to platformio. WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also …☆17Jul 26, 2023Updated 2 years ago
- An Android controlled bluetooth rubber duck - see my hackaday.io project for instructions to make your own for less than $10☆25Jan 2, 2018Updated 8 years ago
- A WiFi enabled USB Keylogger and Keystroke injection tool☆209Mar 18, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Information Gathering & WebSite ReConnaissance.☆24Feb 8, 2018Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 4 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆11Nov 4, 2022Updated 3 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Kernel driver for the Ralink rt5572 dual-band Wi-Fi adapter, configured for use with Boundary Devices boards☆14Jun 26, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Slides from my Area41 security conference talk in Zurich/CH☆18Aug 3, 2019Updated 6 years ago
- OWASP ASVS Assessment Tool☆28Nov 6, 2018Updated 7 years ago
- Tested Ducky script payloads for USB Rubber Ducky☆14Nov 7, 2020Updated 5 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- ☆17May 29, 2015Updated 10 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago