Writes a custom message to your master boot record, inspired by XKCD
☆16Apr 9, 2015Updated 10 years ago
Alternatives and similar repositories for mbr-lovenote
Users that are interested in mbr-lovenote are comparing it to the libraries listed below
Sorting:
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- ☆23Mar 27, 2019Updated 6 years ago
- ☆12Feb 4, 2025Updated last year
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- WLAN API for Windows and Linux☆10Apr 14, 2009Updated 16 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- NVIDIA CPU microcode☆14Mar 10, 2015Updated 10 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Error Level Analysis (ELA) in ImageJ☆10Oct 17, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- ☆13Dec 8, 2016Updated 9 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆30Jul 18, 2014Updated 11 years ago
- ☆14Feb 25, 2025Updated last year
- A kernel module to read/write QFPROM rows on Qualcomm SoC devices with TCP server support.☆15Mar 30, 2016Updated 9 years ago
- machinelearning stuff☆13Nov 2, 2017Updated 8 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- A link shortener.☆10Apr 7, 2021Updated 4 years ago
- Solutions/Challenge files for encore☆13Jan 9, 2026Updated last month
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- ☆12Aug 23, 2019Updated 6 years ago