Simple program to steal private files from removable storages
☆84Feb 2, 2026Updated last month
Alternatives and similar repositories for USB-file_Stealer
Users that are interested in USB-file_Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders☆19Feb 2, 2026Updated last month
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- Find and remove metadata from MS doc or docx files in folder☆14Feb 2, 2026Updated last month
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 2 months ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- Simple script to install STALKER: Shadow of Chernobyl via Wine-Appimage (no wine required)☆10Nov 10, 2023Updated 2 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64May 2, 2020Updated 5 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Website vuln example.☆11Sep 26, 2025Updated 6 months ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- space invaders☆12Jan 28, 2024Updated 2 years ago
- Pdf-exploit builder Non-Silent on C#☆20Aug 31, 2024Updated last year
- A header file for c/c++ of the laws of physics☆11Oct 17, 2022Updated 3 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- DllInject (Memory Load)☆11Jan 5, 2019Updated 7 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Baseline Security Configuration For MacOS☆67Aug 28, 2018Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago