ibndias / dji-drone-hijackingLinks
DJI Drone Control Hijacking
☆36Updated 2 years ago
Alternatives and similar repositories for dji-drone-hijacking
Users that are interested in dji-drone-hijacking are comparing it to the libraries listed below
Sorting:
- BINARLY Research Tools and PoCs☆39Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- PoC code and tools for Black Hat USA 2024☆26Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆93Updated last month
- ☆44Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆28Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 9 months ago
- Force target victim to unsafe network☆29Updated 6 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆33Updated 3 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Updated 9 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 8 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 8 months ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Updated last year
- An In-memory Embedding of CPython☆31Updated 4 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 2 weeks ago
- ☆29Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 11 months ago
- Simple reverse ICMP shell☆14Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆76Updated last year
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- Persistence techniques for windows.☆18Updated 2 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year