Grinchiest / operation-bag-of-toysView external linksLinks
Planning for the Christmas heist
☆59Nov 29, 2021Updated 4 years ago
Alternatives and similar repositories for operation-bag-of-toys
Users that are interested in operation-bag-of-toys are comparing it to the libraries listed below
Sorting:
- A remote access trojan to use against Santa's laptop!☆14Nov 28, 2021Updated 4 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Custom built Syntax Highlight tool for Word Documents☆27Sep 13, 2024Updated last year
- Solutions for Codility lessons and challenges.☆11Mar 12, 2017Updated 8 years ago
- ☆39Jul 1, 2023Updated 2 years ago
- Generate dummy credit card numbers for all well-known card issuers like MasterCard, Visa, JCB, Discover, American Express, etc.☆12Dec 27, 2023Updated 2 years ago
- Create a list of possible usernames for bruteforcing☆82Feb 18, 2024Updated last year
- Knowledge Based Authentication Performance Metrics Projec☆12Nov 20, 2014Updated 11 years ago
- Animations made by python☆10Jun 19, 2020Updated 5 years ago
- ☆11Feb 9, 2026Updated last week
- ☆12Jan 31, 2020Updated 6 years ago
- I2P Daemon written in Rust☆14Apr 7, 2017Updated 8 years ago
- RAD Server Examples☆11Nov 26, 2025Updated 2 months ago
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 9 months ago
- Kali Linux Cheat Sheet☆13Jan 23, 2023Updated 3 years ago
- ☆10Dec 26, 2025Updated last month
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Make your own super cluster☆11Sep 30, 2020Updated 5 years ago
- This is a RAD Studio wizard / expert / plug-in which allow you to right click on an identifier in the code editor and add a breakpoint wh…☆10Sep 17, 2017Updated 8 years ago
- A basic RayCasting demo written in c☆10Sep 27, 2022Updated 3 years ago
- Samples showing Animations, Transitions and Effects in FireMonkey☆14Aug 9, 2016Updated 9 years ago
- MicroCoin Desktop Wallet - MicroCoin is a peer-to-peer Internet currency that enables instant, near-zero cost payments to anyone in the w…☆15Nov 8, 2019Updated 6 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- Send text messages online to any mobile phone in the world.☆11Feb 24, 2017Updated 8 years ago
- Applying Mica Material to VCL forms in Delphi and C++ Builder using RAD Studio☆13Feb 27, 2022Updated 3 years ago
- ☆44Dec 11, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Solutions to Advent of Code 2021 in APL☆11Dec 1, 2022Updated 3 years ago
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆14Jan 6, 2026Updated last month
- ☆15Dec 15, 2016Updated 9 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated 3 weeks ago
- ☆12Aug 22, 2017Updated 8 years ago
- ERC1967 proxies that contain immutable args☆10Aug 7, 2022Updated 3 years ago
- Microsoft Defender for Cloud attack simulation toolkit☆23Dec 24, 2024Updated last year
- Nova is a programming language with a high level of abstraction. This repository contains nova's bytecode compiler written in C# Using An…☆10Mar 8, 2022Updated 3 years ago
- ☆10Oct 12, 2021Updated 4 years ago