dnskire: a tool for file infiltration over DNS
☆20Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for dnskire
Users that are interested in dnskire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encodes a message using emojis based on a specified pattern.☆17Feb 26, 2024Updated 2 years ago
- ⟩⚡PowerShell Emoji 😎😉😍🥰🤔😟☆15Sep 16, 2025Updated 6 months ago
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple Scripts to Supercharge Splatting☆68Sep 7, 2024Updated last year
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆13Mar 15, 2022Updated 4 years ago
- PowerShell made Posh☆71Apr 20, 2024Updated last year
- A simple, intutive, feature rich, php web shell for pen testing.☆14Feb 4, 2020Updated 6 years ago
- Python script that types out the text that exists in clipboard.☆15Mar 31, 2025Updated 11 months ago
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- A centralized list of the various Potato Windows exploits.☆22Dec 30, 2024Updated last year
- EZOut is a PowerShell module to help take the pain out of writing format and types XML☆73Sep 27, 2024Updated last year
- Uses DuckyScript™ to grab NTLM Hashes from Windows machine through discord webhook☆14Oct 31, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆14Aug 29, 2023Updated 2 years ago
- HackRF Sweep Spectrum Analyzer☆13Apr 21, 2025Updated 11 months ago
- An advanced particle life simulation, fine-tuned for maximum complexity and emergence of simulated organisms.☆25Jul 7, 2025Updated 8 months ago
- Check data breaches for Full Name, Passwords, Phone Number, Email Address, IP Address, Password Hashes - and create reports to include al…☆52Jun 17, 2024Updated last year
- Collection of STL for FPV and drones☆42Feb 21, 2026Updated last month
- Windows based version of the popular app Ls Droid used for flashing the 99-07 General Motors V8 Engine Computers☆11Jan 31, 2021Updated 5 years ago
- SDR-TRX is an experimental low-cost digital mode ham radio HF transceiver.☆13Jan 6, 2025Updated last year
- Run Kali Linux and BlackArch using Termux with proot-distro☆12Jul 23, 2025Updated 8 months ago
- Random stuff☆19May 28, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆11Jul 23, 2024Updated last year
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆22Mar 18, 2026Updated last week
- HIGH SCHOOL PROJECT - Simple Arduino library that allows you to communicate in J1850-PWM mode.☆12Nov 15, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Research done about modern hardware keyloggers☆46Feb 13, 2020Updated 6 years ago
- M5-VAMeter firmware☆13Mar 25, 2025Updated last year
- A JavaScript homage to the text decryption effect found in the 1992 movie, Sneakers.☆32Apr 29, 2016Updated 9 years ago
- ESP32 mini Wemos style form factor☆11Apr 16, 2023Updated 2 years ago
- Arduino core for BSFrance AVR boards☆17Mar 24, 2019Updated 7 years ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆138Jul 23, 2024Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago