AyrA / ZipBomb
About an old technology that still screws up some anti virus software
☆138Updated 8 years ago
Alternatives and similar repositories for ZipBomb
Users that are interested in ZipBomb are comparing it to the libraries listed below
Sorting:
- A steganographic program that encodes files in pictures☆108Updated 6 years ago
- Because I'm not a lawyer☆39Updated 7 years ago
- Reverse engineered Discord API that mimics the official webclient.☆62Updated 5 years ago
- Turns Snapchat into a datastore that can manage and store your files.☆327Updated 11 years ago
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Updated 6 years ago
- ☆96Updated last year
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- PewCrypt Ransomware Source☆59Updated 6 years ago
- A simple implementation of ZipBomb in Python☆342Updated last year
- The random (fake!) quote generator.☆32Updated 3 years ago
- sorting algorithm using mkdir☆18Updated 6 years ago
- ☆32Updated 8 years ago
- A proof of concept on how one can read private chats done on omegle☆59Updated 8 years ago
- makes vids into grids, as in the gabe barks x times video☆26Updated 3 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- A collection of crackmes☆40Updated 3 months ago
- Let's brute force this hotel's tv.☆78Updated 5 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Automatically start your minecraft server when a user joins☆20Updated this week
- Twitter as an extra entropy source☆102Updated 6 years ago
- Browse reddit in minecraft - use /reddit and then place a sign with the subreddit name (including r/ !) For Minecraft 1.14 and up, only t…☆36Updated 3 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 5 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- A malicious captive wifi portal☆143Updated 4 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- ☆165Updated 8 years ago
- Brute forces dictionaries for available twitter handles☆31Updated 4 years ago
- Made for making segmented speedruns.☆19Updated 4 years ago
- Removed according to regulations☆35Updated 7 years ago
- The Rickmote Controller: Hijack TVs using Google Chromecast☆221Updated 5 years ago