ibndias / dji-drone-hijackingLinks
DJI Drone Control Hijacking
☆41Updated 2 years ago
Alternatives and similar repositories for dji-drone-hijacking
Users that are interested in dji-drone-hijacking are comparing it to the libraries listed below
Sorting:
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆97Updated 2 months ago
- Force target victim to unsafe network☆29Updated 7 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆34Updated 4 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆62Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated last year
- ☆44Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Purpose-built Red Team network hardware implant made from common components.☆25Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Updated last month
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- BINARLY Research Tools and PoCs☆39Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ☆43Updated last year
- Legba recipes.☆51Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆46Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 10 months ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Simple reverse ICMP shell☆14Updated last year