ddd / gpbLinks
Tool for recovering the phone number tied to a Google account
☆113Updated 5 months ago
Alternatives and similar repositories for gpb
Users that are interested in gpb are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 10 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 10 months ago
- A tool to dump exposed .git repositories☆72Updated 5 months ago
- UAC Bypass using CMSTP in Rust☆33Updated 11 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 10 months ago
- Execute shellcode via ASPNET compiler☆58Updated last month
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆80Updated this week
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆21Updated 11 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Generate Proxy DLLs in Rust☆46Updated 2 months ago
- A way to use fonts to obfuscate text.☆48Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆27Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- Demoting PPL anti-malware services to less than a guest user☆64Updated 9 months ago
- A Rust compiler plugin to encrypt string literal at compile time.☆21Updated 5 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆254Updated last month
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆27Updated 4 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated 11 months ago
- Example of CVE-2024-24576 use case.☆57Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆106Updated last year
- ☆64Updated last year
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆60Updated 2 years ago
- macos stealer poc☆129Updated 4 months ago
- Easy peasy file uploads☆27Updated 2 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 4 months ago
- Rust For Windows Cheatsheet☆121Updated last year
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆94Updated this week
- Attacking the cleanup_module function of a kernel module☆52Updated 4 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆58Updated last month