Joao-b4 / mart-malware-dartView external linksLinks
Malware build on dart
☆20Oct 9, 2022Updated 3 years ago
Alternatives and similar repositories for mart-malware-dart
Users that are interested in mart-malware-dart are comparing it to the libraries listed below
Sorting:
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- ☆15Feb 15, 2022Updated 4 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- use your YI LITE action camera as a wifi webcam☆11Jan 14, 2023Updated 3 years ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Share secrets encrypted☆14Feb 3, 2026Updated 2 weeks ago
- Haskell integration for Visual Studio☆22Aug 10, 2014Updated 11 years ago
- ☆13Sep 23, 2025Updated 4 months ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- ☆11Aug 7, 2021Updated 4 years ago
- RTL-SDR 433MHz signal recovery with MATLAB☆12Feb 13, 2015Updated 11 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆11Aug 23, 2021Updated 4 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- ☆15Mar 28, 2015Updated 10 years ago
- ☆10Sep 12, 2019Updated 6 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Use rtl-sdr to receive EnergyCount 3000 transmissions☆19Oct 10, 2016Updated 9 years ago
- ☆15Aug 21, 2023Updated 2 years ago
- Find and Use Cheats via the PythonGDB API☆11Aug 1, 2016Updated 9 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆13Feb 27, 2025Updated 11 months ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- A Custom Transport strategy of the NestJS microservices pattern for Cloud Pub/Sub☆11Mar 17, 2025Updated 11 months ago
- For the benefit of programmers.☆10Oct 28, 2021Updated 4 years ago
- Howto setup a UEFI Development PC.☆10Jan 5, 2026Updated last month
- 📽 Simple gateway to S3 to serve as a micropub endpoint☆10Dec 9, 2022Updated 3 years ago
- Steals chrome and firefox cookies and upload to the server using POST api.☆10May 3, 2016Updated 9 years ago
- ☆10Mar 25, 2021Updated 4 years ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Mar 27, 2021Updated 4 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago