A GitHub Action to automatically build your android apps with ease!
☆50Oct 5, 2021Updated 4 years ago
Alternatives and similar repositories for app-brickie
Users that are interested in app-brickie are comparing it to the libraries listed below
Sorting:
- A simple and safe replacement to .env files☆25Jan 25, 2021Updated 5 years ago
- Android Library Playground!☆11Oct 23, 2020Updated 5 years ago
- Backend for Palette'21 made using Node.ts☆17May 6, 2025Updated 10 months ago
- An AR Tree (AiR Tree) that you can grow which visualises and teaches you about your surrounding environment. It reacts to the amount of e…☆13Mar 19, 2021Updated 4 years ago
- IEEE-VIT's inventory management app☆24May 19, 2020Updated 5 years ago
- An npm package to read Google Sheets data and convert it to JSON without publishing it to the web☆25Feb 15, 2021Updated 5 years ago
- An feature packed Google Tasks CLI written purely in Rust☆56Feb 9, 2024Updated 2 years ago
- Resource Library of IEEE-VIT☆34Dec 23, 2021Updated 4 years ago
- A highly extensible and configurable automated dotfiles manager that saves your time!☆24Aug 23, 2021Updated 4 years ago
- Keylogger for ethical hackers☆13Aug 25, 2021Updated 4 years ago
- A smart CLI Dashboard to fetch cpu, memory and network stats!☆36Nov 4, 2020Updated 5 years ago
- ⚡️A minimalistic and sweet router for blazing fast bun☆73Oct 18, 2022Updated 3 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- A CLI for katbin☆11Feb 25, 2026Updated last week
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 7 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Time to get your project some action, security action☆11Dec 7, 2021Updated 4 years ago
- One-Stop Solution for all boilerplate needs!☆28Aug 28, 2022Updated 3 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- This is just a security testing tool. Don't use for illigal purpose otherwise we are not responsible for your action.☆14Aug 24, 2020Updated 5 years ago
- laTEX is awesome but we are lazy -> groff with markdown syntax and inline code execution☆28May 4, 2021Updated 4 years ago
- This is Facebook Pishing Tool☆47Jan 22, 2026Updated last month
- InstaCLI is a CLI client for 📷 Instagram.☆16Jul 29, 2023Updated 2 years ago
- hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which …☆15Aug 25, 2020Updated 5 years ago
- Script to monitor pastebin.com's public pastes for sensitive data leakage☆31Dec 2, 2020Updated 5 years ago
- Automatically decline all join requests from Telegram Premium users.☆11Jul 3, 2022Updated 3 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- 1secmail disposable temp mail service from terminal☆12Dec 5, 2022Updated 3 years ago
- A cross platform C++ native app to test HTTP endpoints, available for Windows, Linux and Mac☆16Jun 16, 2024Updated last year
- ☆15Jul 18, 2023Updated 2 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- An app to find repositories on Github and to view the various contributors to said repos.☆29Oct 31, 2023Updated 2 years ago
- Send a spoofed email and receive the IP address of the user who opened it☆15Jun 2, 2020Updated 5 years ago
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- Tensorflow implimentation of HUSE: Hierarchical Universal Semantic Embeddings☆16May 8, 2020Updated 5 years ago
- A simple and handy tool for a hacker to gain remote access and control another computer☆38Oct 29, 2020Updated 5 years ago