Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED
☆17Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for LEDITGO
Users that are interested in LEDITGO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extracted data & informations from the Conti & TrickBot leaks.☆15Mar 12, 2022Updated 4 years ago
- misc scripts☆21Mar 2, 2026Updated 3 weeks ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Password cracking software written in python using Tkinter. Supports rar and zip files.☆15Mar 20, 2021Updated 5 years ago
- hi guys you can use this tool to crack anyones instagram password . if you need to use this tool just got to have some basic hacking know…☆16Mar 18, 2020Updated 6 years ago
- GForce is a bruteforce programm. GForce can hack a gmail account with a big list of passwords. Only for pentesting! :D☆11Jul 26, 2016Updated 9 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Obtain connected WiFi passwords☆20Mar 14, 2022Updated 4 years ago
- Small and simple HD44780 LCD controller library☆10Jun 30, 2019Updated 6 years ago
- Last Day on Earth: Data mining and Leaks☆13Dec 12, 2018Updated 7 years ago
- Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords☆13Jul 17, 2016Updated 9 years ago
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆12May 9, 2023Updated 2 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- POC to demostrates how to hack a bank account on C#☆19Aug 26, 2014Updated 11 years ago
- Two-factor Bitcoin (BIP38)☆36Mar 22, 2015Updated 11 years ago
- ☆14Aug 7, 2024Updated last year
- Automatically exported from code.google.com/p/wifi-password-hack☆30Sep 7, 2015Updated 10 years ago
- The PCB design of the STM8 with the nRF24L01+ Board☆13Feb 4, 2017Updated 9 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- ☆17Jan 2, 2020Updated 6 years ago
- There are millions of people talking about Facebook Account Hacking Tricks. However, a few ones who are in depth in HTML coding and IT ca…☆15Jan 24, 2013Updated 13 years ago
- ☆18May 6, 2023Updated 2 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- HACK CCTV CAMERA ANYWHERE IN THE WOLD USING THIS TOOL #IT IS MY OWN THIS TOOLA IT IS AMAZING BRO #Wait... #FOR INSTALL THIS TOOL TY…☆20Feb 4, 2021Updated 5 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- I have develped an android hacking widget which runs in the background to demonstrate credential sniffing on a primitive android login ap…☆20Jun 29, 2017Updated 8 years ago
- A Secure-ish Crypto Execution Module☆16Jun 22, 2022Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 9 months ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆20Sep 17, 2024Updated last year
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Jun 28, 2022Updated 3 years ago
- rnn/lstm to generate private keys from public keys of known high value☆39Jan 7, 2022Updated 4 years ago
- Open source Java Card applet that allows you to unlock, start, or lock a Tesla Model 3 just like the official key card☆15Oct 19, 2025Updated 5 months ago
- PKCS#11 Tools☆16Oct 20, 2017Updated 8 years ago
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆32Mar 16, 2026Updated last week