☆19Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for Projects
Users that are interested in Projects are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 12, 2024Updated 2 years ago
- ☆14Nov 11, 2023Updated 2 years ago
- An easy to use crate for resampling at a fixed ratio☆10Sep 22, 2025Updated 7 months ago
- Permissionless pooling of NFT's into an ERC20.☆14Dec 22, 2022Updated 3 years ago
- Safe Rust wrapper and bindings to RtAudio☆18Sep 22, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Jul 29, 2018Updated 7 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 months ago
- ☆11Apr 8, 2024Updated 2 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated 3 months ago
- Personal notes from the eJPT course, for the eJPT exam.☆25Sep 13, 2023Updated 2 years ago
- Fuzzer for fastboot commands☆23Sep 14, 2023Updated 2 years ago
- A simple video streaming services with authentication using redis☆14Dec 1, 2023Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Labs and Assignments Juypter Notebooks☆11Mar 5, 2020Updated 6 years ago
- ☆12Sep 6, 2020Updated 5 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- The samples referenced in my book, Evasive Malware (No starch Press)☆60Feb 20, 2026Updated 2 months ago
- This repo contains mindmap and content regarding reflected xss.☆11Aug 11, 2020Updated 5 years ago
- The purpose of this repo is to share my research☆14Apr 7, 2025Updated last year
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Feb 7, 2024Updated 2 years ago
- Deep learning malware detection system using the EMBER dataset☆12Nov 22, 2024Updated last year
- Reasonably undetected shellcode stager and executer.☆34May 23, 2025Updated 11 months ago
- Learning Go by implementing a Chess Engine☆15Feb 23, 2023Updated 3 years ago
- Doubango VoIP framework☆21Feb 19, 2022Updated 4 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 8 months ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- ☆18Mar 22, 2021Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 红队/渗透测试的工具和技术集,项目/A-poc/RedTeam-Tools 中文译版☆12Jan 3, 2023Updated 3 years ago
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Demonstrates why it's not safe to download random save files from the Internet☆20Dec 30, 2022Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 6 years ago
- Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a tar…☆15Apr 21, 2025Updated last year
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆24Nov 20, 2022Updated 3 years ago