A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machines as targets.
☆17Mar 23, 2025Updated last year
Alternatives and similar repositories for KiD
Users that are interested in KiD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 19, 2026Updated last month
- Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat …☆22Apr 10, 2026Updated last week
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- gorobots - robots.txt recon & path discovery in Go. Structured parsing, 29-category sensitivity classification, concurrent path probing, …☆15Apr 10, 2026Updated last week
- Windows Explorer application written in assembly☆15Jun 15, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of BadUSB scripts for the PwnPi & PwnPi A.L.O.A.☆14Nov 14, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆26Aug 24, 2024Updated last year
- ☆11Jun 26, 2024Updated last year
- 🧿Join your two exe files☆13Jul 14, 2020Updated 5 years ago
- A REST-capable, never-blocking HTTP client package that supports HTTPS, keepalive, deflate, chunked encoding for Tcl, NaviServer or AOLse…☆12Dec 15, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13Jul 5, 2023Updated 2 years ago
- Extract a feature vector for any image and find the cosine similarity for comparison using Pytorch. I have used ResNet-18 to extract the …☆21Apr 6, 2024Updated 2 years ago
- A Java implementation of the Raft consensus algorithm☆27Nov 13, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A C/C++ pretty printing library.☆12May 26, 2022Updated 3 years ago
- Probably the slowest FLAC decoder in the world☆11Aug 18, 2022Updated 3 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- An offensive security framework for writing payloads☆17Sep 13, 2022Updated 3 years ago
- Alfred is a advanced OSINT information gathering tool☆12Nov 14, 2025Updated 5 months ago
- This is a collection of everything I have and am learning about OSINT. Feel free to send pull requests adding more stuff! I want to learn…☆12Jan 2, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- CVE-2024-31317☆20Jun 6, 2025Updated 10 months ago
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆18May 19, 2024Updated last year
- kunkillable is an LKM that makes userland processes unkillable.☆17Sep 26, 2020Updated 5 years ago
- Go HTTP client w/ HTTPS and SOCKS5 Proxy Load-balancing, Failover, Retries, Authentication, and RoundTripper☆29Jul 3, 2025Updated 9 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- Dumps all resources from a PE file (EXE, DLL, ...)☆11Jan 13, 2019Updated 7 years ago
- ☆19Aug 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 9 months ago
- ☆28Mar 14, 2026Updated last month
- MASM 6.11 : Microsoft.☆31Apr 8, 2025Updated last year
- Tool CTF Forensik File extract/convert☆15Mar 22, 2024Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆15Mar 11, 2024Updated 2 years ago
- Want to know more about Privacy & Security, you will find mnay helpful Subject Matter Experts as-well-as the resources they use.☆20Apr 20, 2025Updated 11 months ago