ddd / gpbLinks
Tool for recovering the phone number tied to a Google account
☆118Updated 8 months ago
Alternatives and similar repositories for gpb
Users that are interested in gpb are comparing it to the libraries listed below
Sorting:
- A tool to dump exposed .git repositories☆75Updated 8 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- A way to use fonts to obfuscate text.☆50Updated 3 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated last year
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated last year
- UAC Bypass using CMSTP in Rust☆34Updated last year
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆108Updated last year
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Z Anti-Anti-Debugger for Linux☆59Updated 6 months ago
- A Rust compiler plugin to encrypt string literal at compile time.☆21Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- Generate backdoored RSA keys using SETUP☆231Updated 2 months ago
- Example of CVE-2024-24576 use case.☆59Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Updated last year
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆25Updated last year
- Generate Proxy DLLs in Rust☆47Updated 5 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆75Updated 2 years ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- Markov Model libraries, optimized for cracking-focused password generations.☆112Updated 4 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆152Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Updated last month
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆53Updated 10 months ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- ☆89Updated 11 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated this week
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago