25 skills found
NYAN-x-CAT / LimeUSB CsharpMalware USB Spread | Example C#
honeynet / Ghost Usb HoneypotA honeypot for malware that propagates via USB storage devices
FabioBaroni / WASAutomatic USB drive malware scanning tool for the security-minded person
tanc7 / USBRubberDuckyTestsWarning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Ducky Keystroke Attack Device. And trying to determine which methods work.
gungunfebrianza / USB Disk SecurityUSB Security Software. Call the Knight to fight Malware Spread.
Explorer09 / Usb Vaccine(Moved to https://gitlab.com/Explorer09/usb_vaccine) USB malware immunity script and hidden files revealer.
USBGuardian / USBGuardianUSBGuardian is an open source and affordable USB malware cleaning station
merces / Openvaccineprotect USB devices FAT-32 partitions against malware
sdrecords / For YoutubeWelcome to S&D Records.. Subscribe us for new updates... Also Join us On.. https://www.facebook.com/youme007009 https://www.patreon.com/sdrecords http://mbilalnoshahi.blogspot.com/ http://linkedin.com/in/muhammad-bilal... https://twitter.com/BilalNosha https://github.com/Bilal007009 https://www.reddit.com/user/Bilal007009 . In this Video, I will show you how to Remove Virus from your System without any software - Just follow the steps in the video - how to remove virus from laptop,how to remove virus from computer,how to remove virus using cmd,how to remove virus from pc,how to remove virus from windows 8,how to remove virus,Free antivirus,remove virus,how to,how to remove virus with our antivirus,using cmd,cmd,us of cmd,in windows,How to remove a computer virus \/ malware,how to remove malware,how to delete virus,how to delete virus from system In this video I am gonna show you how to remove a folder virus. When you send file to other memory device or open external memory in your computer, you will find a folder which you can not open. It mostly comes through usb drive. You think that this is folder and you try to open it, at that time your PC gets infected. Removing virus by antivirus is quite traditional and it stops learning how to handle virus. It is like if you calculate data only by calculator then it decreases your efficiency. I have made a trick by which you can remove this virus. Also there may be many type of virus which can damage your computer It can be found that virus can be identified by their name which may be exe file or batch file etc. In my video list you can find more about virus removal tricks. If you have a doubts then please comment.. Your are most welcome. for more virus removal trick.. you can watch these video.. For more tricks and tutorials, please subscribe: Remove,Removal,memory card,remove shortcut virus permanently,fix shortcut virus,usb,technology,windows 10,tutorial,how to remove shortcut virus in windows 7,how,computer,tricks,hacks,tips,cmd how to remove viruses from your computer,how to remove virus from windows 8,how to remove virus from windows 10,how to get rid of viruses,how to get rid of viruses 2015,how to get rid of viruses on windows 8,how to remove pop ups,how to remove spyware,remove virus from computer,remove viruses from computer,how,to,remove,virus,viruses,from,windows 8,windows 10,pc,free, Simple video tutorial with explanation what is prefetch and how to delete! windows 7 EXTRA TAGS (Ignore It) : windows 7 virus how to remove virus from windows 7 how to delete junk files in windows 7 how to remove junk files in windows 7 virus windows 7 how to remove virus from computer windows 7 how to delete junk files how to find viruses on windows 7 how to delete viruses on windows 7 clean pc of virus free how to remove viruses from windows 7 windows 7 virus removal how to remove antivirus from windows 7 how to clean virus from windows 7 windows 7 virus como tirar virus do pc windows 7 how wipe all files except windows 7 delete junk files windows 8 windows 7 virus how to remove virus from windows 7 ,8 how to delete junk files in windows 7 ,8 how to remove junk files in windows 7,8 virus windows 7 ,8 how to remove virus from computer windows 7 ,8 how to delete junk files 8 how to find viruses on windows 8 7 how to delete viruses on windows 7 clean pc of virus free 8 how to remove viruses from windows 7 windows 7 virus removal no cost how to remove antivirus from windows 7 how to clean virus from windows 7 windows 7 virus como tirar virus do pc windows 7 how wipe all files except windows 7 delete junk files how delete junk files window 7 virus remove how to clean junk files how to remove virus windows 7 how to clear junk files how to delete virus on windows 7 used window 8 for delete ok prefetch command prefetch windows 7 no survey free no password how delete junk files window 7 virus remove how to clean junk files how to remove virus windows 7 how to clear junk files how to delete virus on windows 7 used window 8 for delete ok prefetch command prefetch windows 7 How-to make your pc laptop run faster temprory internet files cache window Windows Tutorial Linux Desktop Computer Basic "Personal Computer" disk cleanup without any software basic tips "how to make your pc faster" how to Help You "pc run faster" "how to make window 7 faster" "make window 7 faster" "make computer run faster" "how to make pc faster" "how to make laptop faster" computer VIDEO video videos how to make your pc faster,how to,how to make your pc run faster,how to make your pc look cool,Windows 7 (Operating System),mac,apple,better computer,faster computer,how to optimize,Mac OS (Operating System),make your pc,make your,make your make,laptop run faster,pc computer,best pc,desktop pc,pc games,music pc,online pc,technology,it technology,information technology,help Wish You All the Best SdRecords-Money007009 Gram007009-Records007009
MyNameIsEZ / USB Rubber Ducky EXE Download PayloadI created this USB Rubber Ducky payload a while back and just finnished touching it up a bit. Basically what it does is download malware (created by me) from FileDropper.com. Wondering what the malware does? Well it crashes the target system and deletes all programs and files required for reboot.
Sandip-SK / ENHANCED TWO FACTOR AUTHENTICATION SYSTEM WITH AES ENCRYPTION AND ENCRYPTED OTPValidation in the PC world alludes to the demonstration of affirming the credibility of the client's computerized personality guarantee. Right now, mainstream confirmation components are for the most part based the accompanying variables: something that the client has (an item), knows (a mystery), or extraordinarily speaks to him (biometric identifiers). In the easiest structure, a framework that requires verification challenges the client for a mystery, commonly a couple of username and secret word. The section of the right pair awards access on the framework's administrations or assets. Shockingly, this methodology is defenseless to a few weaknesses and disadvantages. These deficiencies range from client chose frail or effectively guessable passwords to more modern dangers, for example, malware and console sniffers(keyloggers) etc. To minimize the vulnerabilities, we use a system of random OTP send to registered email id of the user at the time of login so as to prevent the hacker from gaining access to the resources even when he has the password and OTP generated is always unique so unless the hacker has access to emails of the user the system is secure. We have minimized the use of session variable and cookies in the proposed system sensitive data is only stored in database that too using AES encryption. This property alone delivers assaults including word reference assaults and console sniffers computationally hard expanding our capacity to safeguard against brute force attacks. Although biometric authentication systems are considered to be more secure, but in web applications it is not feasible to implement such resource intensive authentication mechanisms thus multifactor authentication using is the balance between secure and user-friendly systems. Multifaceted verification is typically cultivated by joining the customary content-based confirmation with another factor. These elements can incorporate keen cards, USB tokens, handheld gadgets, or one-time secret phrase tokens. Having at least two variables fortifies the resources. The point of the proposed framework is to furnish the client with the safer verification. In this task, the proposed framework is a Multi-factor Authentication System for giving greater security to profoundly classified information. Our methodology conquers the restrictions of the conventional password frameworks.
decay88 / LimeUSBMalware USB Spread | POC | Example
MrEchoFi / EchoFi USB Rubber DuckyA RED TEAM' rubber ducky USB . By this USB u can inject malicious script or install malware in any pc or laptop
crash0ver1d3 / ClamAVscanUtilizing ClamAV, automatically scan USB drive for virus or malware, once mounted to a Raspberry Pi, or Linux device.
Aryia-Behroziuan / Social Engineering TechniquesIn some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administrator to divulge some useful information that helps them exploit the website. There are many forms of social engineering attacks, including: Phishing Users of a website are sent fraudulent emails that look like they have come from the website. The user is asked to divulge some information, such as their login details or personal information. The hacker can use this information to compromises the website. Baiting This is a classic social engineering technique that was first used in the 1970s. A hacker will leave a device near your place of business, perhaps marked with a label like “employee salaries”. One of your employees might pick it up and insert it into their computer out of curiosity. The USB stick will contain malware that infects your computer networks and compromises your website. Pretexting A hacker will contact you, one of your customers or an employee and pretend to be someone else. They will demand sensitive information, which they use to compromise your website. The best way to eliminate social engineering attacks is to educate your employees and customers about these kinds of attacks.
merces / Usbforcesimple USB malware stopper
ikingmakers / USB Miner Cleanup ToolkitPowerShell toolkit that scrubs an aggressive USB crypto miner which hijacks the Windows service layer and propagates through removable media. It targets shortcut-based malware families that replace real files with `.lnk` launchers pointing back to malicious payloads.
olimsaidov / Autorun RemoverTool for removing malware files from usb dongle
alaa737 / NjRAT 0.8.0 LIME EDITIONnjRAT has been around since at least 2013 and is one of the most prevalent malware families. Built in .NET Framework, the malware provides attackers with remote control over the infected systems, utilizes dynamic DNS for command-and-control (C&C), and uses a custom TCP protocol over a configurable port for communication. Dubbed njRAT Lime Edition, the new malware variant includes support for ransomware infection, Bitcoin grabber, and distributed denial of service (DDoS), while also being able to log keystrokes, spread via USB drives, steal passwords, and lock the screen.
LucaBarile / USBDriveDataStealerA simple tool that steals a drive's data when it is plugged into your PC.