Blue Cosmo (@PrettyBoyCosmo)
  • Stars
    star
    158
  • Global Rank 147,861 (Top 6 %)
  • Followers 260
  • Following 27
  • Registered about 4 years ago
  • Most used languages
    Python
    33.3 %
    PowerShell
    25.0 %
    Shell
    16.7 %
    Batchfile
    8.3 %
    Java
    8.3 %
    HTML
    8.3 %

Top repositories

1

DucKey-Logger

DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one out due to its ability to start keylogging and send logs via Gmail at every startup of the computer. it also has an the 'c.cmd' attack opportunity [scroll to bottom].
PowerShell
52
star
2

PrettyBoyCosmo

15
star
3

BunnyLogger

BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke
PowerShell
13
star
4

EthicalHacker-EDC

a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series
11
star
5

DuckyLan

A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP
PowerShell
7
star
6

HTTP-List

a list of websites that still used http :|
6
star
7

SharkTato

a backdoor for the sharkjack "powered" through discord webhooks
Shell
4
star
8

Wargames

A collection of my CTF [Capture The Flag] notes. These CTF's including TryHackMe [THM], HackTheBox [HTB], and ETC [et cetera, all other CTF's are listed there]. This repository includes King Of The Hill events as well.
HTML
4
star
9

profiler

Introducing "Profiler". A False Identity Profile Generator. The Result of Yet Another 50-hour Programming Challenge.
Java
3
star
10

net-owl

Welcome to Net-Owl - [Network Exfiltraion Tasks On WLan]. A Windows Wifi Password Exfiltrator. The Result of a 50-hour Programing Challenge
Python
3
star
11

the-codex-project

this is a python suite for cryptography. we are currently building it together on YouTube [https://www.youtube.com/c/CosmodiumCS]. it will contain several ciphers and be able to encrypt, decrypt, and bruteforce different files and text.
Python
3
star
12

TREMOR

Tremor is a worm virus that is powered through the Shark Jack. It will use the the Shark Jack, it's built in port scanner, and other features to send malware across the network
2
star
13

capulator

Introducing Capulator A Full Functioning Calculator With A Hidden Vault [Built In] The Result of a 12-hour Programming Challenge
Python
1
star
14

Satux

Satux is a linux malware that escalates via changing the sudo command to grab the password entered after it. It will send the password back to us via a discord webhook.
1
star
15

dotfiles

files with a dot infronta em
Shell
1
star
16

Caesar-Cipher

Hey Hackers! Blue Cosmo from CCS here and today I want to give an update on the progress of the CodeX Project. I have started work on the first cipher of the project, The Caesar Cipher! Here's a an overview of the cipher and a video will be releasing soon Happy Hacking!
Python
1
star
17

DuckMinistrator

DuckMinistrator gets an administrator Powershell using command line and batch, to simply ask for administrative permissions
Batchfile
1
star