C# Service that blocks the computer at unauthorized USB introduction
☆25Feb 20, 2020Updated 6 years ago
Alternatives and similar repositories for USBBlocker
Users that are interested in USBBlocker are comparing it to the libraries listed below
Sorting:
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- 🔐 Wrapper arround .NET Cryptography library☆17Sep 23, 2025Updated 5 months ago
- ☆20Jul 23, 2023Updated 2 years ago
- ☆14Oct 31, 2016Updated 9 years ago
- NanoCore rat stub source code☆38May 25, 2022Updated 3 years ago
- Convert VBS file to EXE☆17May 17, 2025Updated 9 months ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Dec 26, 2021Updated 4 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.☆26Mar 13, 2021Updated 4 years ago
- ☆39Mar 25, 2021Updated 4 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- STM32 Hiperface Encoder circuit and software☆11Nov 14, 2023Updated 2 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- Graphical User Interface for Mpress☆40Dec 26, 2018Updated 7 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 3 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Python utility to listen, timestamp and log data received from a serial port.☆11Aug 28, 2023Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- A lightweight C# library that brings a modern UWP-style look to traditional WinForms applications. Easily enhance your desktop apps with …☆31Apr 30, 2025Updated 10 months ago
- AspNet Web API Role-Based Authorization. RBAC 权限管理☆11Apr 15, 2025Updated 10 months ago
- ☆12Dec 28, 2022Updated 3 years ago
- Archived version of AutoHotkeyCE (unicode only)☆17Sep 29, 2018Updated 7 years ago
- FreeCAD Workbench that provides a terminal, file upload and on screen realtime position feedback via USB connection☆10Nov 11, 2023Updated 2 years ago
- PWM Input measurement code for the Raspberry Pi Pico PIO☆10Apr 5, 2021Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- ☆12Sep 2, 2024Updated last year
- autohotkey syntax highlighting☆15Oct 19, 2010Updated 15 years ago
- Convert COM Type Libraries to AutoHotkey code.☆10Oct 13, 2017Updated 8 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Unofficial implementation of Microsoft.Extensions.Hosting for WPF.☆12Feb 15, 2026Updated 2 weeks ago