Exfiltrate data with QR code videos generated from files by HTML5/JS.
☆40Oct 29, 2014Updated 11 years ago
Alternatives and similar repositories for QRCode-Video-Data-Exfiltration
Users that are interested in QRCode-Video-Data-Exfiltration are comparing it to the libraries listed below
Sorting:
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- Hack any account sending fake nitro QR code (only for educational purpose)☆16Jan 7, 2022Updated 4 years ago
- Study and research with your docs, media, and AI in one place☆33Updated this week
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- ansible roles for SCAP scanning☆30Jun 7, 2016Updated 9 years ago
- ☆13Nov 5, 2024Updated last year
- A library and tool for querying, executing and exporting TR-064 devices and services☆10Apr 4, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- ☆16May 13, 2021Updated 4 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- ☆19Jan 15, 2026Updated last month
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Command line interface client to RFQuack dongles☆10Sep 23, 2022Updated 3 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- ☆11May 2, 2022Updated 3 years ago
- The repository for papaer "Distance between Relevant Information Pieces Causes Bias in Long-Context LLMs"☆14Dec 16, 2024Updated last year
- Whale FM archive, data☆16Mar 4, 2015Updated 11 years ago
- Wifi Marauder for the 2.8'' ESP32 Module ESP32-2432S028R WiFi+BT Dual-core 240X320 Smart Display. Better know as the CYD.☆12Jun 6, 2024Updated last year
- ☆10Jan 17, 2022Updated 4 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- My custom kali live build configuration☆10Jan 29, 2021Updated 5 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- A simple Sinatra app to test when an image is opened.☆11Feb 6, 2014Updated 12 years ago
- ☆15Aug 17, 2023Updated 2 years ago