ddd / gpbLinks
Tool for recovering the phone number tied to a Google account
☆106Updated 3 months ago
Alternatives and similar repositories for gpb
Users that are interested in gpb are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆123Updated 8 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 8 months ago
- A way to use fonts to obfuscate text.☆47Updated 2 years ago
- UAC Bypass using CMSTP in Rust☆32Updated 9 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆138Updated 8 months ago
- Example of CVE-2024-24576 use case.☆57Updated last year
- A tool to dump exposed .git repositories☆72Updated 3 months ago
- A DLL proxy generator written in Rust.☆36Updated 10 months ago
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆64Updated this week
- Generate Proxy DLLs in Rust☆44Updated 2 weeks ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- A simple Meterpreter stager written in Rust.☆40Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆117Updated last month
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆104Updated last year
- DNS over HTTPS targeted malware (only runs once)☆97Updated 2 years ago
- A Rust compiler plugin to encrypt string literal at compile time.☆21Updated 3 months ago
- Rust implementation of lazy_importer☆57Updated 2 years ago
- Z Anti-Anti-Debugger for Linux☆55Updated 2 months ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 3 years ago
- ☆64Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆84Updated 7 months ago
- ☆89Updated 7 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆26Updated last year
- A programming language that compiles to Minecraft datapacks☆14Updated last year
- Process Injection - Shellcode (Rust)☆16Updated last year
- Dynamically invoke arbitrary code and use various tricks written idiomatically in Rust (Dinvoke)☆93Updated 2 weeks ago
- Generate a proxy dll for arbitrary dll☆207Updated 11 months ago