IR0DayToday / Xerosploit-PY3View external linksLinks
Xerosploit based on python3 rooling done !
☆15Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for Xerosploit-PY3
Users that are interested in Xerosploit-PY3 are comparing it to the libraries listed below
Sorting:
- Repository of GitHub Actions used by the Oh My Zsh project☆22Sep 4, 2020Updated 5 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆10Oct 1, 2022Updated 3 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated last month
- Hex community are packages the community maintains on Hex☆18Apr 3, 2016Updated 9 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- An open source tool for scrapping fresh and usable proxies. Supports HTTP, SOCKS4, SOCKS5☆11Nov 7, 2024Updated last year
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Computer Vision project - Eye blink detection framed into game of longest staring with opencv and python☆12Aug 9, 2020Updated 5 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆40Updated this week
- 🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.☆10Mar 2, 2022Updated 3 years ago
- A robot powered training repository☆10May 28, 2021Updated 4 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Apr 9, 2019Updated 6 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- ☆44Nov 12, 2025Updated 3 months ago
- Reference frontend service for SuperVisor written in Python☆17May 28, 2021Updated 4 years ago
- Karras et al. (2022) diffusion models for PyTorch☆18May 6, 2024Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- modify field(modWhen, crc) in android odex file;安卓APP“寄生兽”漏洞☆14Jul 7, 2015Updated 10 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- ☆16Apr 6, 2021Updated 4 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- ☆16Apr 16, 2015Updated 10 years ago
- Serverless Framework – Build web, mobile and IoT applications with serverless architectures using AWS Lambda, Azure Functions, Google Clo…☆12Jan 23, 2023Updated 3 years ago
- 字符串加密插件☆16Apr 9, 2019Updated 6 years ago
- Proofpoint URL Decoder☆20Oct 25, 2017Updated 8 years ago
- Public OCI-Image (docker image) Security Checker☆20Dec 24, 2025Updated last month
- ☆17Sep 23, 2022Updated 3 years ago
- A Python script for indexing (putting) FireEye alert data into Elasticsearch...and notifying you too.☆16Dec 11, 2018Updated 7 years ago
- Caffe code for the paper "Adversarial Manipulation of Deep Representations"☆17Nov 6, 2017Updated 8 years ago
- Hook native with xposed☆18Mar 4, 2022Updated 3 years ago
- ☆17Jan 25, 2026Updated 3 weeks ago
- ☆19Jul 9, 2019Updated 6 years ago
- Resources, options, and thoughts about funding FOSS projects☆18Nov 1, 2016Updated 9 years ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆32Jul 31, 2025Updated 6 months ago
- A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds…☆39Updated this week
- A simple dependency injection library for Rust☆24Dec 21, 2023Updated 2 years ago