A Metamorphic virus 🌺
☆19Feb 1, 2022Updated 4 years ago
Alternatives and similar repositories for death
Users that are interested in death are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆23Jun 30, 2021Updated 4 years ago
- A simple index for HackTheBox machine along with tags☆16Mar 26, 2026Updated 2 weeks ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ORDER - A small Python web-app to practice blind SQLi in order by☆22Mar 21, 2021Updated 5 years ago
- Gebze Teknik Üniversitesinde verilen Bilgi ve Ağ Güvenliği dersinin lab uygulamaları. Herbir uygulama kriptoloji alanındaki ayrı ayrı kon…☆18Nov 28, 2016Updated 9 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- ☆15Jun 27, 2024Updated last year
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- ℁ Retrieve your external IP address via DNS☆16Mar 3, 2023Updated 3 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Detecting cryptocurrency-related communications in network traffic☆11Apr 5, 2020Updated 6 years ago
- A biblioteca ES32Lab tem como objetivo facilitar a vida dos programadores que estejam desenvolvendo programas para projetos que utilizam …☆10Aug 6, 2025Updated 8 months ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api☆13Dec 8, 2021Updated 4 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ☆15Apr 20, 2023Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 11 months ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Examples of self-modifying x86 linux assembly☆11Dec 20, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 6 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- ESP32 Pentesting tool project☆15May 26, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago