Extract data from "Raid: Shadow Legends"
☆59Nov 7, 2021Updated 4 years ago
Alternatives and similar repositories for RaidExtractor
Users that are interested in RaidExtractor are comparing it to the libraries listed below
Sorting:
- ☆48Feb 10, 2024Updated 2 years ago
- ☆13Jan 16, 2023Updated 3 years ago
- Unlimited multi-battles with campaign calculator for official 'Raid: Shadow Legends' on Windows☆22May 30, 2021Updated 4 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 7 months ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- The way production should look.☆16Dec 31, 2013Updated 12 years ago
- A simple auto-updating systemd unit to run Portainer☆13Jan 23, 2021Updated 5 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- ffxi gearswap lua's - ARCHIVED☆12Dec 30, 2021Updated 4 years ago
- A fluent SQLite Query API for Android☆20Jun 12, 2016Updated 9 years ago
- Analysis of Hearthstone replays☆11May 18, 2017Updated 8 years ago
- ☆16Apr 1, 2022Updated 3 years ago
- WIP - An ebay auction sniper written in Go☆12Jul 18, 2022Updated 3 years ago
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago
- ☆12Jan 25, 2016Updated 10 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- On-device Android forensics tookit☆32Feb 19, 2026Updated last week
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Tesseract bindings for .NET☆14Oct 11, 2022Updated 3 years ago
- ☆21May 11, 2021Updated 4 years ago
- A library that contains pre-written UI components such as form support, image clipping, image library, date pickers, etc.☆14Oct 23, 2018Updated 7 years ago
- Security based project. Create a phising page and push it either locally or on-line!☆17Jun 4, 2023Updated 2 years ago
- Write fixtures compactly, expand them to a vector☆12Jan 10, 2017Updated 9 years ago
- ☆12Sep 21, 2021Updated 4 years ago
- This Python script cracks passwords using a brute force approach that generates all possible character combinations. It can be customized…☆14May 1, 2023Updated 2 years ago
- A library to use and communicate with the EA FC web app API.☆21Oct 7, 2025Updated 4 months ago
- Hearthstone fatigue tracker (HDT Plugin)☆13Jun 13, 2017Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- Utilities to communicate with Polycom phones☆15Nov 12, 2013Updated 12 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Router for Om.Next☆13Apr 22, 2016Updated 9 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Hacker Inside Dude☆12Nov 29, 2018Updated 7 years ago
- MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.☆16Nov 25, 2015Updated 10 years ago
- Tool to create database of FIFA football player ratings☆11Sep 2, 2018Updated 7 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago