A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtrual Machine)
☆15Apr 1, 2018Updated 7 years ago
Alternatives and similar repositories for Hyperjackers-Handbook
Users that are interested in Hyperjackers-Handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command Line Interface/Framework for Black Hat CTF Competitors☆10Dec 8, 2022Updated 3 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- The DropDownButtonLib project supplies MVVM/WPF drop down controls that are based on a button.☆12Sep 3, 2019Updated 6 years ago
- Implements a themable recent locations (forward, backward, up. pop-up list) control a la Windows (7-10) Explorer☆11Jan 29, 2021Updated 5 years ago
- Bootstrapping setup for participants☆10Dec 29, 2021Updated 4 years ago
- debian scripts and code☆18Jul 29, 2016Updated 9 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 8 years ago
- ☆15Jan 21, 2020Updated 6 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- Documentation project for RoyaleAPI☆23Jul 16, 2024Updated last year
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- New and improved Man-In-The-Middle Framework fixes for Nethunter Phones and Tablets☆28Oct 26, 2018Updated 7 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆15Oct 30, 2022Updated 3 years ago
- ☆10Mar 22, 2019Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Code and Word2Vec embeddings of LOINC codes for KDD 2019 DSHealth paper "Evaluation of Embeddings of Laboratory Test Codes for Patients a…☆11Jun 13, 2024Updated last year
- A tool for code readout of 'protected' NRF51 devices - using a ST-LINK/jtag.☆16Nov 16, 2019Updated 6 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- ☆10Jan 1, 2020Updated 6 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- 🖼️ imgur.com 📤 image/video uploader library for ESP32☆19Aug 10, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- A polylinear timeline with clustering, centred on interactions. — Doc and demo https://octree-gva.github.io/Zeitline/☆18Aug 28, 2024Updated last year
- Navigation system for django sites☆12Jun 26, 2025Updated 8 months ago
- Extension for Chromium-based broswers that skips video ads and hides other 5+ types of banner ads on YouTube, as well as displays statist…☆14May 6, 2024Updated last year
- Simple example of separate rotation of 3d objects with using Kivy☆18Jun 24, 2013Updated 12 years ago
- Data and analysis related to generational changes in attitudes toward gun control☆10Sep 5, 2022Updated 3 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- This system will be used to keep track of inventory, Sales, Orders, Quotations, Customers, Suppliers and employees alike. It should gener…☆13Oct 7, 2022Updated 3 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- Create, Read, Update, Delete (Polygon, LineString, Point) geometries with geodjango web framework☆15Apr 21, 2023Updated 2 years ago
- In the Django Authentication package is that all users use the same model/profile. This can be a drawback if you have lots of users or yo…☆25Feb 6, 2016Updated 10 years ago
- Sample assets for the Inspector.☆11Sep 9, 2024Updated last year
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- Linux on Asus Flow x13 - required tools and setup☆21Jan 4, 2022Updated 4 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago