Simple program to steal private files from removable storages
☆84Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for USB-file_Stealer
Users that are interested in USB-file_Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders☆20Feb 2, 2026Updated 2 months ago
- Find and remove metadata from MS doc or docx files in folder☆14Feb 2, 2026Updated 2 months ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- Azure DevOps Server development system segmentation best practices☆11Sep 20, 2022Updated 3 years ago
- TesserCap is a GUI based, point and shoot CAPTCHA analysis tool☆18Jul 8, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 3 months ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Dec 2, 2022Updated 3 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆62May 2, 2020Updated 5 years ago
- A storytllr-based C64 fantasy text adventure☆17Feb 19, 2024Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆11Dec 17, 2018Updated 7 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- space invaders☆12Jan 28, 2024Updated 2 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- A header file for c/c++ of the laws of physics☆11Oct 17, 2022Updated 3 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- Fast IP Lookups for Open Ports and Vulnerabilities from API internetdb shodan☆28Feb 3, 2022Updated 4 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Baseline Security Configuration For MacOS☆67Aug 28, 2018Updated 7 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Now you can download the most powerful tools using this simple script☆15Apr 27, 2019Updated 6 years ago
- Authoritative DNS servers☆41Updated this week
- ☆12Jun 20, 2022Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago