waynearmorize / drivesploitView external linksLinks
drivesploit-testing
☆26Jul 28, 2010Updated 15 years ago
Alternatives and similar repositories for drivesploit
Users that are interested in drivesploit are comparing it to the libraries listed below
Sorting:
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆13Mar 20, 2019Updated 6 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆41Jan 10, 2017Updated 9 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- Command line utility that executes a command (plaintext or encryted) as another user account or under specified user session☆18Jun 6, 2019Updated 6 years ago
- war3 dota maphack, lua☆17May 26, 2016Updated 9 years ago
- 仿WPE拦截Socket☆17Nov 7, 2013Updated 12 years ago
- Tutorial building Game Server writing in C and client writing in cocos2d-x html5☆15Apr 19, 2020Updated 5 years ago
- Universal decompiler☆33Jun 23, 2014Updated 11 years ago
- [Unofficial Mirror] GDI++ is a replacement for the Windows default font rasterizer that provides font smoothing (i.e. anti-aliasing) like…☆29Aug 5, 2014Updated 11 years ago
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Feb 12, 2023Updated 3 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆28Nov 5, 2020Updated 5 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- some way to prevent process be killed☆27Aug 19, 2015Updated 10 years ago
- This repository contains the registries for components, agents and services, the second part of the autonolas-v1 protocol.☆15Feb 5, 2026Updated last week
- An example epoll imlementation with C++11☆30Jan 24, 2017Updated 9 years ago
- headless-ida-mcp-server☆28Apr 4, 2025Updated 10 months ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Apr 13, 2017Updated 8 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 12 years ago
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- Apache Aries Remote Services Admin☆12Jul 2, 2025Updated 7 months ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Ghost (Game Host) -- A dedicated Warcraft III game host for Battle.net and PvPGN.☆104Jun 26, 2008Updated 17 years ago
- 组件比antd少了几个, 但是功能也很多哦, 原生JS编写☆11Mar 10, 2025Updated 11 months ago
- QPinableTabWidget is a normal QTabWidget that allows you to pin and unpin tabs.☆12Sep 28, 2025Updated 4 months ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- With the exception of GUI GDI, there are basic examples of almost all Windows features to help you understand all the basic apis of Windo…☆12Nov 7, 2022Updated 3 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last week
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Repository for the Oulu University Security Engineering course.☆13Sep 12, 2025Updated 5 months ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- CameraCipher Library (an IOCipher project)☆11Jul 14, 2015Updated 10 years ago