A python based utility to download animes for offline viewing ¯\(ツ)/¯
☆13Mar 22, 2021Updated 5 years ago
Alternatives and similar repositories for S3miNa
Users that are interested in S3miNa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 10 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Complete Youtube downloader which includes playlist downloading and scheduling of downloads☆14May 27, 2016Updated 9 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆20May 19, 2023Updated 2 years ago
- A telegram bot in python which upload the photos on Google Drive in a group conversation.☆19Oct 6, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- PoC malware built by copy-paste☆25Apr 10, 2021Updated 4 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- Musixmatch API interfaces and applications☆13Aug 11, 2011Updated 14 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Hack all mobile androi☆11Aug 22, 2016Updated 9 years ago
- ☆10May 6, 2017Updated 8 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- ☆13Sep 8, 2024Updated last year
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Flutter UI experiments.☆16Nov 2, 2025Updated 4 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ☆13Feb 20, 2026Updated last month
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- A general-purpose pythonic genetic algorithm.☆18Oct 7, 2019Updated 6 years ago
- Compilation of Manually Tagged Roman Urdu Dataset (Urdu written in Latin/Roman Script), along with other helpful Roman Urdu NLP resources☆34Oct 6, 2020Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago