FourThievesVinegar / vinniView external linksLinks
☆26Aug 1, 2025Updated 6 months ago
Alternatives and similar repositories for vinni
Users that are interested in vinni are comparing it to the libraries listed below
Sorting:
- ☆10Sep 11, 2021Updated 4 years ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- FlowLLM: Simplifying LLM-based HTTP/MCP Service Development☆32Jan 7, 2026Updated last month
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A textbook centered around teaching mathematics to physicists and chemists☆12Feb 10, 2022Updated 4 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- Tools and pages to track horizontal issues☆12Feb 8, 2026Updated last week
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 8 months ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Jan 28, 2026Updated 2 weeks ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Plans for DIY nanodrop☆10Oct 18, 2019Updated 6 years ago
- [IROS 2022] Transporters with Visual Foresight (TVF)☆11Jul 25, 2022Updated 3 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- Basic collection of data mining algorithms implemented in Go☆10Jul 12, 2014Updated 11 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Implementation of kexstat via /dev/kmem with kernel ASLR support☆36Dec 5, 2015Updated 10 years ago
- Top-down maze game.☆12Updated this week
- Julia implementation of flash-attention operation for neural networks.☆11May 31, 2023Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- Dump iceriver firmware files and filesystem☆10Oct 3, 2023Updated 2 years ago
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 2 years ago
- Repo to track PING initiated issues on other standards documents.☆11Mar 22, 2025Updated 10 months ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Code snippets. Miscellaneous purposes and languages.☆20Jun 16, 2022Updated 3 years ago
- Better testing for Plutus☆11Nov 15, 2022Updated 3 years ago
- propositional satisfiability problem (SAT) goes neural and deep☆12Aug 17, 2021Updated 4 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Re-usable low-level ML components☆10Oct 31, 2018Updated 7 years ago
- my dissertation!☆11Sep 6, 2022Updated 3 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 9 months ago
- SNMP simulator control plane☆14Apr 20, 2020Updated 5 years ago
- sokobang - sokoban puzzle w/ bigbang.coffee☆14Dec 16, 2023Updated 2 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago