JBalanza / USBBlockerLinks
C# Service that blocks the computer at unauthorized USB introduction
☆26Updated 5 years ago
Alternatives and similar repositories for USBBlocker
Users that are interested in USBBlocker are comparing it to the libraries listed below
Sorting:
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 3 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41Updated 4 years ago
- ☆21Updated 6 years ago
- ☆16Updated 4 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Updated 5 years ago
- Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).☆82Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆110Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Download a .NET payload and run it on memory☆70Updated 6 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆99Updated 11 months ago
- Spoof parent process ID☆13Updated 7 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 3 years ago
- The Hunt for Malicious Strings☆13Updated 5 years ago
- Hellokitty Ransomware Source Code☆18Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Updated 4 years ago
- Simple c# source code obfuscator☆28Updated 7 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- Collection of Offensive C# Tooling☆13Updated 4 years ago