BadUSB ile Penetrasyon
☆13Jun 15, 2019Updated 6 years ago
Alternatives and similar repositories for BadUSB
Users that are interested in BadUSB are comparing it to the libraries listed below
Sorting:
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- A log parsing engine written in Java for high performance. Additionally, logger is also highly configurable.☆15Aug 13, 2018Updated 7 years ago
- An automated tool for creating ProtonVPN accounts 🌐☆21Dec 11, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- Adds an IP Address feed (CIDR) into Check Point Objects via a URL☆11May 22, 2020Updated 5 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- 互通 Telegram 和 QQ 訊息☆10Feb 3, 2023Updated 3 years ago
- A Sass powered animated book plugin☆13Oct 14, 2019Updated 6 years ago
- PowerShell solution for creating PRTG sensors and reports on environments, based on json custom configurations.☆13May 16, 2019Updated 6 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- 情侣App 以及H5网站☆11May 16, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- ☆10Sep 20, 2020Updated 5 years ago
- This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.☆14Oct 9, 2023Updated 2 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Find credit card info using BIN/IIN☆12Dec 29, 2025Updated 2 months ago
- ☆10Jan 17, 2022Updated 4 years ago
- A high-performance i2c LCD driver for the Arduino IDE☆15Jan 29, 2012Updated 14 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- Código de @Cadibot en Telegram☆10Jan 11, 2026Updated last month
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- ☆10Dec 9, 2018Updated 7 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- 🗄️ Auto-archive your webpages on the Internet Archive☆12Jun 18, 2024Updated last year
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- ☆10Jun 26, 2024Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- İnternet Vergi Dairesi Sorgualamaları☆14Dec 23, 2021Updated 4 years ago
- Çeşitli kütüphaneler kullanılarak Türkçe kod açıklamalarıyla pratik derin öğrenme uygulamaları.☆10Nov 20, 2017Updated 8 years ago