ddd / gpbLinks
Tool for recovering the phone number tied to a Google account
☆115Updated 6 months ago
Alternatives and similar repositories for gpb
Users that are interested in gpb are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 11 months ago
- A tool to dump exposed .git repositories☆73Updated 6 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 10 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 11 months ago
- UAC Bypass using CMSTP in Rust☆33Updated last year
- macos stealer poc☆133Updated 5 months ago
- Generate backdoored RSA keys using SETUP☆208Updated 2 weeks ago
- A way to use fonts to obfuscate text.☆48Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆106Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Updated 2 months ago
- Execute shellcode via ASPNET compiler☆58Updated 2 months ago
- Z Anti-Anti-Debugger for Linux☆58Updated 4 months ago
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆24Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆35Updated 3 years ago
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆85Updated last week
- Demoting PPL anti-malware services to less than a guest user☆64Updated 10 months ago
- Rust For Windows Cheatsheet☆120Updated 2 weeks ago
- Example of CVE-2024-24576 use case.☆59Updated last year
- A Rust compiler plugin to encrypt string literal at compile time.☆21Updated 6 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆12Updated 8 months ago
- CVE-2025-56383-Proof-of-Concept☆53Updated 2 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- A slightly more fun way to disable windows defender☆49Updated 7 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆124Updated last month
- ☆89Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago