Ginray / USB-DumperLinks
You can use this application to automatically copy the files and folders from the USB that is connected to your computer.
☆28Updated 8 years ago
Alternatives and similar repositories for USB-Dumper
Users that are interested in USB-Dumper are comparing it to the libraries listed below
Sorting:
- Simple program to steal private files from removable storages☆86Updated last week
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- Windows anti-forensics USB monitoring tool.☆69Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- ☆20Updated 4 years ago
- ☆111Updated last month
- A tool that automates MAC address and hostname spoofing☆61Updated 6 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆76Updated 4 years ago
- ☆19Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539☆60Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- ☆125Updated last year
- Low Interaction Mobile Honeypot☆97Updated 7 months ago
- ☆32Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- Your go-to resource for all things OSINT☆180Updated last year
- ☆39Updated 3 years ago
- ☆152Updated 11 years ago
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆18Updated 10 months ago
- A collection of tools created for computer security research purposes.☆135Updated last week
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- I am making a python virus that will be fully undetectable. And use zero third party modules !. This is a proof of concept that all antiv…☆10Updated 2 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆55Updated 3 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53Updated last year
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- PINTool to help analyzing malware that uses process injection☆15Updated 4 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago