You can use this application to automatically copy the files and folders from the USB that is connected to your computer.
☆28Apr 1, 2017Updated 9 years ago
Alternatives and similar repositories for USB-Dumper
Users that are interested in USB-Dumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to extract the SIP info from your Livebox Fibra (Orange Spain and Jazztel Spain) and change the API password☆14Sep 25, 2017Updated 8 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 3 months ago
- hikkavision recovery tool for Windows and Linux, ip caneras password, reset ip camera password, recover password, ip camera passwords, hi…☆37Oct 3, 2016Updated 9 years ago
- ☆18Feb 12, 2022Updated 4 years ago
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆54Jan 26, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆96Dec 2, 2025Updated 4 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- Home of https://redteam.guide☆15Apr 1, 2026Updated 3 weeks ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆15Apr 20, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆93Mar 6, 2024Updated 2 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 8 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆16Jun 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- SSE to Stdio MCP Proxy Server☆23Mar 9, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Windows And Ways To Break It☆100Jan 28, 2026Updated 3 months ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆13Apr 25, 2019Updated 7 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Provides a consistent API around some existing scanning tools to integrate them with the rest of the tool kit☆20Updated this week
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Dec 9, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆18Sep 29, 2023Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 5 months ago
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- Unique site visits counter in Go☆19Dec 15, 2023Updated 2 years ago