evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)
☆29Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for evilmass_at90usbkey2
Users that are interested in evilmass_at90usbkey2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆16May 15, 2021Updated 4 years ago
- ☆11Oct 13, 2019Updated 6 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Python3 library for sophisticated timing attacks using Gaussian Mixture Model.☆22Apr 10, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Slides and stuffs of the meetings during the 2020.☆16Jan 18, 2022Updated 4 years ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆47Jan 15, 2022Updated 4 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Empowering journalists and whistleblowers☆19Oct 16, 2021Updated 4 years ago
- ☆16Mar 10, 2018Updated 8 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- App that detects if is running on an emulated environment☆13May 15, 2020Updated 5 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Utilities to extract secrets from 1Password☆109Aug 17, 2021Updated 4 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- SDR tools and scripts☆83Jan 29, 2020Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- A linux-like su/sudo on Windows. Transferred from https://github.com/DoubleLabyrinth/WindowsSudo.☆33Oct 12, 2019Updated 6 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆16Sep 13, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A streaming implementation of SipHash in C as well as an optimized one-pass implementation.☆27Nov 5, 2012Updated 13 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Slurm Examples☆10Aug 30, 2024Updated last year
- ☆37Jul 24, 2016Updated 9 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆69Apr 29, 2021Updated 5 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- RF430FRL152H examples for NFC Type V in Kicad and C.☆78Jan 2, 2020Updated 6 years ago
- IDAPython project for Hex-Ray's IDA Pro☆12Jul 2, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆16Feb 14, 2023Updated 3 years ago
- Jetson-Nano-Python☆16Oct 6, 2025Updated 7 months ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆39Mar 16, 2022Updated 4 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- A reverse Geo lookup service written in C, accessible via HTTP and backed by OpenCage and LMDB☆15Aug 20, 2025Updated 8 months ago