ReFleX - Deep Image Recognition Bot
☆24Oct 14, 2020Updated 5 years ago
Alternatives and similar repositories for ReFleX
Users that are interested in ReFleX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of various awesome lists for hackers, pentesters and security researchers☆57Oct 2, 2018Updated 7 years ago
- Web App Pen Tester (Web Interface)☆32Dec 6, 2022Updated 3 years ago
- ☆11May 6, 2019Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The source code of iDecryptIt - an IPSW firmware decryption tool☆16Mar 11, 2026Updated 2 months ago
- Automatically post images from a subreddit to an instagram account.☆10Feb 24, 2022Updated 4 years ago
- A host-based IDS and network monitoring system (My graduation project)☆27Jul 6, 2021Updated 4 years ago
- URLs very strong obfuscation tool (can be used in requests too)☆18Oct 3, 2024Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆30Jun 24, 2020Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Mar 31, 2022Updated 4 years ago
- In Browser Recording Studio 🎥☆12Apr 16, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated last month
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Dragonfire is an open source virtual assistant project for RaspberryPi OSMC/Kodi☆17May 18, 2017Updated 9 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- JS Challenge for Youtube☆10May 11, 2019Updated 7 years ago
- Small script to brute force discount codes☆19Feb 13, 2015Updated 11 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Nov 29, 2022Updated 3 years ago
- Renders information for DJs on Twitch☆11Feb 11, 2025Updated last year
- 🔥 Discover trending videos from Reddit and curated YouTube channels – Soon using Next.js. See `dev` branch☆15May 14, 2026Updated last week
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Email Spoofing Tool is a Python Script that helps to Spoof Email Addresses, The mail spoofed by this tool lands 100% on inbox and the too…☆14Mar 16, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- Notes on entropy and complexity☆21Mar 7, 2022Updated 4 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago