☆13Apr 14, 2014Updated 11 years ago
Alternatives and similar repositories for Auto-Hacking-USB
Users that are interested in Auto-Hacking-USB are comparing it to the libraries listed below
Sorting:
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆11Feb 16, 2020Updated 6 years ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- A simple windows batch script intended to look like an FBI security warning, while stealing their data onto a USB.☆10Apr 5, 2022Updated 3 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Oct 14, 2021Updated 4 years ago
- All my batch files...☆11Mar 3, 2018Updated 8 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- A POC for the Java agent of Elastic APM☆12Mar 1, 2018Updated 8 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- Facebook phishing page☆10Oct 4, 2020Updated 5 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- A sample IE BHO for logging Internet Explorer's POST data.☆10Dec 29, 2017Updated 8 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Docker for CentOS Weblogic with domain☆12Jun 22, 2017Updated 8 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- TLS SNIp - Rule based proxy for routing/filtering TLS/SSL protocols.☆13May 3, 2017Updated 8 years ago
- Ce script vous permettra de protéger votre site web contre les attaque d'aspirateurs (comme le logiciel HTTrack).☆13May 21, 2025Updated 9 months ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Array object operation under Vue☆15Oct 24, 2018Updated 7 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Harvest self-signed certs from Project Sonar Internet-wide scan files and have a look around.☆10Mar 22, 2017Updated 8 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Dec 29, 2015Updated 10 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago