whid-injector / WHID-Mobile-Connector
Android Mobile App for Controlling WHID Injector remotely.
☆198Updated 2 years ago
Alternatives and similar repositories for WHID-Mobile-Connector
Users that are interested in WHID-Mobile-Connector are comparing it to the libraries listed below
Sorting:
- A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.☆206Updated 9 years ago
- SImple duckyscript interpreter in Bash.☆269Updated 4 years ago
- mirror☆309Updated 8 months ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆138Updated 10 years ago
- Official repository for the Shodan.io mobile Application☆160Updated last year
- kali_nethunter☆179Updated 3 years ago
- Its is a simple shell script that brute force Android Lock screen (When USB DEBUGGING is enable) its uses ADB tools FOR BruteForce☆121Updated 7 years ago
- Android app to run duckyscript☆47Updated 3 years ago
- WiFi Enabled USB Rubber Ducky☆150Updated 8 years ago
- A simple to use USB HID Rubber Ducky Launch Pad for Android.☆599Updated last year
- USB Rubber ducky payload to bypass lock-screen on 5.x build (LMY48I) and below☆58Updated 9 years ago
- Bruteforce the Android Passcode given the hash and salt.☆185Updated 2 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆258Updated 6 years ago
- This Magisk module adds the required firmware for external wireless adapters to be used with NetHunter.☆224Updated 3 years ago
- rubber ducky scripts☆54Updated 8 years ago
- Exploitation Framework for ATtiny85 Based HID Attacks☆349Updated 4 years ago
- Download airgeddon's required files from github, optionally specify branch and save location☆36Updated 2 years ago
- Windows GUI for USB Rubber Ducky☆94Updated 2 years ago
- ANDRAX The first and unique Penetration Testing platform for Android smartphones☆106Updated 6 years ago
- Run interactive android exploits in linux.☆140Updated 3 months ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆258Updated 7 years ago
- The Router Exploitation Framework☆84Updated 8 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆52Updated 8 years ago
- Bluetooth Honeypot☆255Updated 4 years ago
- A collection of Payloads for the WHID Cactus☆50Updated 5 years ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆60Updated 9 years ago
- Hey there, This tool will help you to install Kali-Nethunter in your non-rooted android device with root privileges in CLI or GUI mode. H…☆84Updated 2 years ago
- Station to perform WiFi network audits, using Raspberry Pi Zero W or Raspberry Pi 3, with connection from the BT or Mobile Data cell phon…☆107Updated 4 years ago
- ANDRAX Advanced Penetration Testing Platform for Android Smartphones☆74Updated 2 years ago
- wirelessFirmware☆54Updated 4 years ago