USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and rerouting DNS within seconds of plugging it in
☆10Dec 23, 2014Updated 11 years ago
Alternatives and similar repositories for usbdriveby
Users that are interested in usbdriveby are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- A simple linkedin profile scraper for nodejs☆14Sep 6, 2016Updated 9 years ago
- A Slack Client written in Python wtih Urwid☆28Sep 26, 2023Updated 2 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 7 years ago
- New Honeypot Version: 1.2! This pH7CMS module is a simple but effective honeypot fake Admin CP for the security of your website. Honey…☆12Aug 3, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Creates a series of empty folders named after default keyspaces.☆12Nov 13, 2015Updated 10 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Some examples about JavaScript from basic to advanced.☆15Aug 7, 2017Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 7 years ago
- Download keys for firmware restores from Apple☆31Jul 6, 2015Updated 10 years ago
- Public Nullsecurity Website☆14Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Javascript plugin to build kanban boards only 2KB☆10Aug 14, 2022Updated 3 years ago
- ☆19Apr 29, 2015Updated 11 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- Scripts and resources for porting the entirety of Escape Velocity Nova to the open source game Endless Sky☆14Mar 23, 2019Updated 7 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆50Feb 25, 2015Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- InformaCam Android Core Service Library☆46Jul 28, 2015Updated 10 years ago
- Implements an Android service that provides a rudimentary implementation of Zebra's DataWedge than be run on non-Zebra devices☆17Oct 6, 2020Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- [ICCV2025 Highlight] GazeGaussian: High-Fidelity Gaze Redirection with 3D Gaussian Splatting☆29Sep 10, 2025Updated 7 months ago
- A Pictorial Book of Tor Hidden Services.☆25Dec 1, 2017Updated 8 years ago
- The BASIC-BINARY-IPC system provides an interface for performing inter process communication using IPv4 or local streams. The interface f…☆21Nov 7, 2021Updated 4 years ago
- the long awaited sequel☆15Aug 20, 2024Updated last year
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Chat made with the most modern javascript technology☆10Dec 11, 2022Updated 3 years ago
- Generator for fake ID barcodes. (Currently SC only, looking to expand).☆33Jan 5, 2015Updated 11 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- prepl is a REPL implementation, also known as a Lisp listener☆14Jun 11, 2025Updated 10 months ago
- Man in the middle tool☆30Oct 20, 2015Updated 10 years ago