ddd / gpbLinks
Tool for recovering the phone number tied to a Google account
☆107Updated 4 months ago
Alternatives and similar repositories for gpb
Users that are interested in gpb are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 9 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 9 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆104Updated last year
- UAC Bypass using CMSTP in Rust☆32Updated 10 months ago
- DNS over HTTPS targeted malware (only runs once)☆95Updated 2 years ago
- A tool to dump exposed .git repositories☆72Updated 4 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆139Updated 8 months ago
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- A Rust compiler plugin to encrypt string literal at compile time.☆21Updated 4 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆27Updated last year
- Execute shellcode via ASPNET compiler☆56Updated last week
- A DLL proxy generator written in Rust.☆36Updated 11 months ago
- Generate Proxy DLLs in Rust☆43Updated last month
- CVE-2025-56383-Proof-of-Concept☆47Updated 2 weeks ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 3 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆45Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆137Updated 9 months ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆23Updated 3 months ago
- macos stealer poc☆124Updated 2 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 3 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆35Updated 3 weeks ago
- DJI Drone Control Hijacking☆35Updated 2 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆85Updated 7 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆55Updated last month
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆69Updated 9 months ago
- Demoting PPL anti-malware services to less than a guest user☆62Updated 8 months ago
- Call Stack Spoofing for Rust☆193Updated this week