Tool to Disable User Lock
☆25Nov 22, 2022Updated 3 years ago
Alternatives and similar repositories for Avilla-Unlock-Samsung-Devices
Users that are interested in Avilla-Unlock-Samsung-Devices are comparing it to the libraries listed below
Sorting:
- Emulation of application data in its original state.☆16Nov 19, 2022Updated 3 years ago
- Signal database acquisition and decryption.☆32Nov 19, 2022Updated 3 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆18Oct 18, 2020Updated 5 years ago
- Official urlscan.io and urlscan Pro CLI tool☆31Updated this week
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Jan 5, 2021Updated 5 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Dec 5, 2025Updated 3 months ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- @wifi.id Account Extractor & Checker☆24May 24, 2018Updated 7 years ago
- ☆29Oct 19, 2024Updated last year
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- ☆32Mar 2, 2026Updated last week
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- 𝚃𝚄𝙰𝙽 𝙱𝙰𝙳𝚄𝚃 || 𝚃𝙾𝙾𝙻𝚂 𝙽𝙸𝙺 𝙳𝙰𝙽 𝙽𝙾 𝙺𝙺 𝙶𝙴𝙽𝙴𝚁𝙰𝚃𝙾𝚁 𝙵𝚁𝙴𝙴 𝚃𝙰𝙽𝙿𝙰 𝚁𝙾𝙾𝚃!!!☆13Sep 1, 2019Updated 6 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- Lacak lokasi pakai nomor hp Premium tool!!☆21May 26, 2019Updated 6 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Instashell v1.5.5 Author: github.com/thelinuxchoice Edited & Uploaded By: kNIGHT(github.com/cyberknight777) IG: instagram.com/thelinuxcho…☆17Jan 15, 2021Updated 5 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- Buat virtex wa di termux☆12Jul 13, 2019Updated 6 years ago
- Blood Bank Management System (BBMS) is a browser based system that is designed to store, process, retrieve and analyze information concer…☆11Dec 26, 2017Updated 8 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- ☆10Sep 3, 2021Updated 4 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 7 months ago