You can use this application to automatically copy the files and folders from the USB that is connected to your computer.
☆28Apr 1, 2017Updated 8 years ago
Alternatives and similar repositories for USB-Dumper
Users that are interested in USB-Dumper are comparing it to the libraries listed below
Sorting:
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- ☆23Jan 1, 2018Updated 8 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated 3 weeks ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆91Mar 6, 2024Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- A set of social media OSINT tools that I use when participating in Trace Labs Search Party CTF☆77Jan 1, 2024Updated 2 years ago
- SSE to Stdio MCP Proxy Server☆20Mar 9, 2026Updated last week
- ☆15Apr 20, 2020Updated 5 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆14Jun 27, 2022Updated 3 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- Windows And Ways To Break It☆100Jan 28, 2026Updated last month
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- ☆12Nov 1, 2022Updated 3 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Dec 9, 2021Updated 4 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆18Sep 29, 2023Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- Provides a consistent API around some existing scanning tools to integrate them with the rest of the tool kit☆19Mar 12, 2026Updated last week
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- ☆16Jun 23, 2024Updated last year