WSLTools
☆23Jul 5, 2018Updated 7 years ago
Alternatives and similar repositories for WSLTools
Users that are interested in WSLTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sarahah XSS Explotiation Tool☆16Aug 19, 2017Updated 8 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆18Sep 12, 2017Updated 8 years ago
- The Social-Engineer Toolkit (SET) automatic installer for Android☆118Jun 29, 2019Updated 6 years ago
- FPV Screen conversion☆10Sep 7, 2018Updated 7 years ago
- NITRO, PAYSAFECARD, STEAM CODES GENERATOR☆13Jun 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Frp Bypass Tool For Android SmartPhones☆18Feb 24, 2024Updated 2 years ago
- FRP Bypass.☆10Oct 29, 2024Updated last year
- ☆11May 30, 2021Updated 4 years ago
- HTB write-ups with detailed walkthroughs, screenshots, and tutorials for ethical hacking, CTF challenges, and penetration testing.☆29Nov 10, 2025Updated 4 months ago
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- All in one tool for Information Gathering and Vulnerability Scanning☆11Jan 13, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Build adb and fastboot with NDK.☆15Aug 8, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- bypass frp lock on Android phones☆12Apr 20, 2024Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- ☆20Mar 26, 2025Updated last year
- Install zsh on termux☆12Dec 30, 2024Updated last year
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Wifi Monitor on Termux Project☆32Dec 23, 2017Updated 8 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆15Jan 7, 2026Updated 3 months ago
- 🐡 ⚙️ Personal config files, handbook and more.☆33Feb 15, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Issues for the Play Store build of Termux☆43Jun 9, 2024Updated last year
- A small string masking library in javascript☆12Dec 15, 2023Updated 2 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- PHP SDK for Telegram bots API☆14Mar 20, 2026Updated 2 weeks ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Mar 31, 2022Updated 4 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- ☆21Nov 2, 2019Updated 6 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Cool Pop for iOS☆51Apr 6, 2015Updated 11 years ago
- QR designer web app with a novel method of designing qr codes that does not take advantage of error correction☆10Sep 24, 2024Updated last year
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago