• Stars
    star
    4
  • Rank 3,304,323 (Top 66 %)
  • Language
    Shell
  • License
    Other
  • Created over 2 years ago
  • Updated about 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

a backdoor for the sharkjack "powered" through discord webhooks

More Repositories

1

DucKey-Logger

DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one out due to its ability to start keylogging and send logs via Gmail at every startup of the computer. it also has an the 'c.cmd' attack opportunity [scroll to bottom].
PowerShell
52
star
2

PrettyBoyCosmo

15
star
3

BunnyLogger

BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke
PowerShell
13
star
4

EthicalHacker-EDC

a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series
11
star
5

DuckyLan

A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP
PowerShell
7
star
6

HTTP-List

a list of websites that still used http :|
6
star
7

Wargames

A collection of my CTF [Capture The Flag] notes. These CTF's including TryHackMe [THM], HackTheBox [HTB], and ETC [et cetera, all other CTF's are listed there]. This repository includes King Of The Hill events as well.
HTML
4
star
8

profiler

Introducing "Profiler". A False Identity Profile Generator. The Result of Yet Another 50-hour Programming Challenge.
Java
3
star
9

net-owl

Welcome to Net-Owl - [Network Exfiltraion Tasks On WLan]. A Windows Wifi Password Exfiltrator. The Result of a 50-hour Programing Challenge
Python
3
star
10

the-codex-project

this is a python suite for cryptography. we are currently building it together on YouTube [https://www.youtube.com/c/CosmodiumCS]. it will contain several ciphers and be able to encrypt, decrypt, and bruteforce different files and text.
Python
3
star
11

TREMOR

Tremor is a worm virus that is powered through the Shark Jack. It will use the the Shark Jack, it's built in port scanner, and other features to send malware across the network
2
star
12

capulator

Introducing Capulator A Full Functioning Calculator With A Hidden Vault [Built In] The Result of a 12-hour Programming Challenge
Python
1
star
13

Satux

Satux is a linux malware that escalates via changing the sudo command to grab the password entered after it. It will send the password back to us via a discord webhook.
1
star
14

dotfiles

files with a dot infronta em
Shell
1
star
15

Caesar-Cipher

Hey Hackers! Blue Cosmo from CCS here and today I want to give an update on the progress of the CodeX Project. I have started work on the first cipher of the project, The Caesar Cipher! Here's a an overview of the cipher and a video will be releasing soon Happy Hacking!
Python
1
star
16

DuckMinistrator

DuckMinistrator gets an administrator Powershell using command line and batch, to simply ask for administrative permissions
Batchfile
1
star