ibndias / dji-drone-hijackingLinks
DJI Drone Control Hijacking
☆31Updated last year
Alternatives and similar repositories for dji-drone-hijacking
Users that are interested in dji-drone-hijacking are comparing it to the libraries listed below
Sorting:
- Force target victim to unsafe network☆20Updated this week
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆22Updated 3 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 7 months ago
- An In-memory Embedding of CPython☆28Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆75Updated this week
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- BINARLY Research Tools and PoCs☆36Updated 8 months ago
- ☆41Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 4 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Linux Sleep Obfuscation☆97Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆13Updated 4 months ago
- BLE based C2 for Hak5's Bash Bunny☆16Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- OSED Practice binary☆24Updated last year
- PoC code and tools for Black Hat USA 2024☆21Updated 10 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆33Updated 2 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆12Updated this week
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- Purpose-built Red Team network hardware implant made from common components.☆22Updated 2 years ago
- Select any exported function in a dll as the new dll's entry point.☆79Updated 7 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆60Updated 6 months ago