☆35Jul 17, 2019Updated 6 years ago
Alternatives and similar repositories for USB-Bootkit
Users that are interested in USB-Bootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆205Apr 18, 2022Updated 3 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 参考《利用分块传输吊打所有WAF》修改的requests的Adapter☆98Jan 31, 2019Updated 7 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- ☆17May 29, 2018Updated 7 years ago
- xinetd-kafel is a more secure replacement for xinetd with secure computing (seccomp, only work on linux)☆18Jun 9, 2018Updated 7 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Explore Indicators of Compromise Automatically☆97Feb 27, 2020Updated 6 years ago
- CTF challenge and Writeup☆13Apr 11, 2019Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 梧桐百科投稿通道☆22May 21, 2018Updated 7 years ago
- Reverse Shell as a Service☆66Nov 9, 2020Updated 5 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆26May 7, 2016Updated 9 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- GitLab 11.4.7 SSRF配合redis远程执行代码☆120Apr 24, 2019Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- 第一期安全编写指南,主要是为了提高小密圈会员群,红日小组单独成立一个项目,来提高小伙伴Python安全编写。主要涉及安全脚本开发、POC编写、安全扫描器编写。目前内容不敢涉及太多,由于小密圈基础不统一,所以我们从基础开始做起。如果你想学习,没有组织,没有团队,那么你可以加入…☆12Dec 5, 2017Updated 8 years ago
- Use Wg Gen Web to manage Kilo peers☆10Apr 7, 2021Updated 4 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- linux内核提权后门模块demo☆36Jun 11, 2019Updated 6 years ago
- 视频分割、分解、合成代码☆11Mar 24, 2019Updated 7 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CCTV Camera scanner using the GoAhead webserver exploit☆20May 25, 2025Updated 10 months ago
- ☆13Jul 22, 2019Updated 6 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Online editor / visualizer for Kaitai Struct .ksy files☆10Apr 19, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago