ibndias / dji-drone-hijackingLinks
DJI Drone Control Hijacking
☆34Updated last year
Alternatives and similar repositories for dji-drone-hijacking
Users that are interested in dji-drone-hijacking are comparing it to the libraries listed below
Sorting:
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 9 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Force target victim to unsafe network☆26Updated 2 months ago
- ☆41Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆80Updated last week
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 8 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 weeks ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 5 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆30Updated 5 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- An In-memory Embedding of CPython☆30Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆15Updated 8 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- BINARLY Research Tools and PoCs☆36Updated 11 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- Simple reverse ICMP shell☆14Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 6 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆26Updated 11 months ago
- ☆125Updated last year
- Kiwi PN532 SPI library for Arduino☆16Updated last month
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 8 months ago
- ☆18Updated 10 months ago
- A simple Meterpreter stager written in Rust.☆40Updated 11 months ago
- Rehashing APIs to prevent hash based detection☆12Updated 7 months ago