Decrypt and recover data (passwords, cookies, history, credit card) from navigator (chrome, firefox, IE, ...), wifi, windows systems, ...
☆20Jul 12, 2019Updated 6 years ago
Alternatives and similar repositories for LDMv2
Users that are interested in LDMv2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Direct shell in C. Reverse shell in C. Both over TCP.☆36Dec 14, 2016Updated 9 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Roblox Hack Free Robux Generator Unlimited. Roblox Robux Hack. Roblox Free Robux. Roblox Robux Generator. Roblox Unlimited Robux. Roblox …☆18Nov 21, 2021Updated 4 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆14Sep 2, 2025Updated 7 months ago
- ☆11Aug 2, 2017Updated 8 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- ☆13Sep 18, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripts and other stuff for Termux, a Linux environment for Android☆11Dec 16, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- This tool is a plugin based version checker for .NET obfuscators.☆12Jun 13, 2016Updated 9 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆21Mar 11, 2023Updated 3 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- allows for magnetic card swipe data input using the square card reader plugged into the headphone port of your laptop or tablet☆17Jun 21, 2014Updated 11 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- A chrome extension to provide ← ↓ ↑ → and H J K L keyboard shortcuts to major websites.☆17May 25, 2024Updated last year
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Thrift API for Xiaomi Structured Datastore Service☆13Feb 28, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple parser(library) which extracts shimcache data from windows.☆15May 20, 2019Updated 6 years ago
- Encrypts and loads encrypted DLLs☆57Nov 14, 2018Updated 7 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Read Navicat 12 Password☆19Jun 7, 2020Updated 5 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆47Jun 10, 2016Updated 9 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago