USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and rerouting DNS within seconds of plugging it in
☆10Dec 23, 2014Updated 11 years ago
Alternatives and similar repositories for usbdriveby
Users that are interested in usbdriveby are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- A simple linkedin profile scraper for nodejs☆14Sep 6, 2016Updated 9 years ago
- A Slack Client written in Python wtih Urwid☆28Sep 26, 2023Updated 2 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- New Honeypot Version: 1.2! This pH7CMS module is a simple but effective honeypot fake Admin CP for the security of your website. Honey…☆12Aug 3, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Creates a series of empty folders named after default keyspaces.☆12Nov 13, 2015Updated 10 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Some examples about JavaScript from basic to advanced.☆15Aug 7, 2017Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- Download keys for firmware restores from Apple☆31Jul 6, 2015Updated 10 years ago
- Public Nullsecurity Website☆14Jan 2, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Javascript plugin to build kanban boards only 2KB☆10Aug 14, 2022Updated 3 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- Scripts and resources for porting the entirety of Escape Velocity Nova to the open source game Endless Sky☆14Mar 23, 2019Updated 7 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆49Feb 25, 2015Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- InformaCam Android Core Service Library☆46Jul 28, 2015Updated 10 years ago
- Implements an Android service that provides a rudimentary implementation of Zebra's DataWedge than be run on non-Zebra devices☆17Oct 6, 2020Updated 5 years ago
- the long awaited sequel☆14Aug 20, 2024Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- [ICCV2025 Highlight] GazeGaussian: High-Fidelity Gaze Redirection with 3D Gaussian Splatting☆27Sep 10, 2025Updated 6 months ago
- A Pictorial Book of Tor Hidden Services.☆26Dec 1, 2017Updated 8 years ago
- The BASIC-BINARY-IPC system provides an interface for performing inter process communication using IPv4 or local streams. The interface f…☆21Nov 7, 2021Updated 4 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Chat made with the most modern javascript technology☆10Dec 11, 2022Updated 3 years ago
- Generator for fake ID barcodes. (Currently SC only, looking to expand).☆32Jan 5, 2015Updated 11 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- prepl is a REPL implementation, also known as a Lisp listener☆14Jun 11, 2025Updated 9 months ago
- Man in the middle tool☆30Oct 20, 2015Updated 10 years ago