evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)
☆29Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for evilmass_at90usbkey2
Users that are interested in evilmass_at90usbkey2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆16May 15, 2021Updated 4 years ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆23Jan 3, 2021Updated 5 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Slides and stuffs of the meetings during the 2020.☆16Jan 18, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆47Jan 15, 2022Updated 4 years ago
- ☆19Aug 22, 2023Updated 2 years ago
- Exploits solution for CrackLatinos challenges☆17Sep 29, 2019Updated 6 years ago
- ☆16Mar 10, 2018Updated 8 years ago
- Collection of Technical Analysis Indicator written in PineScript to be used in TradingView Application.☆17Jul 12, 2025Updated 9 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆32Apr 7, 2026Updated last week
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SDR tools and scripts☆83Jan 29, 2020Updated 6 years ago
- UART proxy tool for inter-chip analysis.☆23Mar 14, 2025Updated last year
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Files and challenges for the OSINT workshop including examples☆22Feb 16, 2020Updated 6 years ago
- ☆13Aug 24, 2016Updated 9 years ago
- A linux-like su/sudo on Windows. Transferred from https://github.com/DoubleLabyrinth/WindowsSudo.☆33Oct 12, 2019Updated 6 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆16Sep 13, 2024Updated last year
- Reverse text segment x64 ELF infector written in Assembly☆20Oct 16, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A streaming implementation of SipHash in C as well as an optimized one-pass implementation.☆27Nov 5, 2012Updated 13 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Slurm Examples☆10Aug 30, 2024Updated last year
- Some Malduino ducky scripts☆26May 22, 2017Updated 8 years ago
- Flowgraphs from balint256's GNU Radio Tutorials☆37Sep 12, 2013Updated 12 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆69Apr 29, 2021Updated 4 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ScreenshotLogger works just like a keylogger but instead of capturing keystroke,it captures the screen, stores it or sends via email.☆19Apr 1, 2022Updated 4 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Extension of SMBLibrary for RPC calls☆35Jun 11, 2024Updated last year
- IDAPython project for Hex-Ray's IDA Pro☆12Jul 2, 2015Updated 10 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- ☆33Nov 14, 2025Updated 5 months ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago