Simple program to steal private files from removable storages
☆84Feb 2, 2026Updated last month
Alternatives and similar repositories for USB-file_Stealer
Users that are interested in USB-file_Stealer are comparing it to the libraries listed below
Sorting:
- Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders☆19Feb 2, 2026Updated last month
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- Find and remove metadata from MS doc or docx files in folder☆14Feb 2, 2026Updated last month
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated last month
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Azure DevOps Server development system segmentation best practices☆11Sep 20, 2022Updated 3 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Simple script to install STALKER: Shadow of Chernobyl via Wine-Appimage (no wine required)☆10Nov 10, 2023Updated 2 years ago
- ☆13Jan 17, 2026Updated last month
- space invaders☆12Jan 28, 2024Updated 2 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 5 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- ☆12Jan 23, 2020Updated 6 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- A simple and stable deobfuscator for ZenFuscator☆17Oct 7, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A storytllr-based C64 fantasy text adventure☆16Feb 19, 2024Updated 2 years ago
- A curated list of cryptography resources and links.☆17Aug 9, 2020Updated 5 years ago
- Now you can download the most powerful tools using this simple script☆14Apr 27, 2019Updated 6 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A header file for c/c++ of the laws of physics☆11Oct 17, 2022Updated 3 years ago