ibndias / dji-drone-hijacking
DJI Drone Control Hijacking
☆26Updated last year
Alternatives and similar repositories for dji-drone-hijacking:
Users that are interested in dji-drone-hijacking are comparing it to the libraries listed below
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆37Updated 5 months ago
- Simple reverse ICMP shell☆13Updated 11 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Purpose-built Red Team network hardware implant made from common components.☆22Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆13Updated 2 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 10 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated 2 months ago
- Force target victim to unsafe network☆20Updated last week
- ☆20Updated 3 weeks ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆11Updated last month
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆19Updated 2 years ago
- An In-memory Embedding of CPython☆26Updated 3 years ago
- ☆12Updated 2 weeks ago
- ☆18Updated 2 months ago