ibndias / dji-drone-hijackingLinks
DJI Drone Control Hijacking
☆35Updated 2 years ago
Alternatives and similar repositories for dji-drone-hijacking
Users that are interested in dji-drone-hijacking are comparing it to the libraries listed below
Sorting:
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆85Updated last month
- Force target victim to unsafe network☆26Updated 4 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 11 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- An In-memory Embedding of CPython☆30Updated 4 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆31Updated last month
- ECC Public Key Cryptography☆38Updated last year
- Simple reverse ICMP shell☆14Updated last year
- BINARLY Research Tools and PoCs☆37Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 6 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- ☆28Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- OSDP attack tool (and the Elvish word for friend)☆101Updated 2 years ago
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 9 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 4 months ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago