USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices
☆23Dec 16, 2023Updated 2 years ago
Alternatives and similar repositories for USB-Monitor
Users that are interested in USB-Monitor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆46Sep 24, 2025Updated 6 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Some scripts to abuse kerberos using Powershell☆356Jul 27, 2023Updated 2 years ago
- C++ Program used to dump Themida and VMProtect.☆34Dec 13, 2023Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- ☆11Apr 23, 2019Updated 6 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- ☆10Apr 2, 2016Updated 10 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Library and tools to access the Master Boot Record (MBR) volume system format☆14Dec 21, 2025Updated 3 months ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- libdt is part of the "Huorong eXtendible Stream Scan Engine" project copyright by Huorong Borui (Beijing) Technology Co., Ltd.☆14Aug 17, 2015Updated 10 years ago
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated 2 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 10 months ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Nov 11, 2020Updated 5 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 7 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- x64dbg plugin to bypass Themida 3.1.x+ Anti-Debug, VM Detection & Monitoring Software☆19Aug 3, 2023Updated 2 years ago
- In-memory hiding technique☆64Jan 5, 2025Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- remem is a C++ library designed for memory manipulation, function calling, and pattern scanning. It supports various calling conventions,…☆10Aug 23, 2024Updated last year
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago