☆45Apr 17, 2019Updated 6 years ago
Alternatives and similar repositories for Malicious
Users that are interested in Malicious are comparing it to the libraries listed below
Sorting:
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Latest FUD GMail phishing webpage generator☆31Jun 27, 2020Updated 5 years ago
- a recommendation list of math courses for people with no math background.☆11Mar 2, 2021Updated 5 years ago
- ☆10Feb 19, 2022Updated 4 years ago
- Script to Install Sudo Root on Android Termux (ROOT REQUIRED)☆11Aug 18, 2018Updated 7 years ago
- ☆12Aug 31, 2018Updated 7 years ago
- parental control android☆10Apr 19, 2019Updated 6 years ago
- C programming example codes.☆10Apr 30, 2021Updated 4 years ago
- PassGen is a tool which generates a custom passwords with 20+ char ,easy to remember and cannot be bruteforced☆58Mar 1, 2022Updated 4 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- ⭐ It would be great to recreate the experience of actually rolling dice in the browser. It would be reminiscent of marathon Monopoly with…☆13Oct 26, 2023Updated 2 years ago
- penetration testing utilities☆10Mar 30, 2021Updated 4 years ago
- This is a spamming tool, to get leads.☆11Dec 7, 2020Updated 5 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Data structure and algorithms in C and C++.☆10Jun 2, 2021Updated 4 years ago
- Helm chart to deploy Kellnr on kubernetes☆15Feb 21, 2026Updated 2 weeks ago
- Febry Afrinsyah :)☆16Mar 7, 2021Updated 5 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- Awesome Hacking and Tech. Related Tutorials☆11May 14, 2025Updated 9 months ago
- DEPRECATED: Tool for checking data leaks of social media platforms☆10Feb 20, 2022Updated 4 years ago
- React library for Spotify codes☆11Mar 6, 2021Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Template to get you started in a dev environment with next/typescript/tailwind☆10Jan 6, 2023Updated 3 years ago
- followers与following比较(可看哪些是相互follower)☆12Aug 27, 2021Updated 4 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- a tool for port to search and kill☆10Mar 31, 2017Updated 8 years ago
- code for my video guide about raycasting https://www.youtube.com/watch?v=DFZnzCbmlng☆10Jan 18, 2021Updated 5 years ago
- HTML Encryptor & Decryptor☆13Jun 17, 2021Updated 4 years ago
- A tool for generating OIDC identities☆14Mar 2, 2026Updated last week
- secure Your Termux app with username and password updated v.1.2☆193Oct 5, 2020Updated 5 years ago
- A collection of malware that we use for testing and training☆12Nov 11, 2020Updated 5 years ago
- WinGPG is a tray-based classical Windows application, Windows NT Explorer shell extension, and a classic GPGv2 distribution. Secure your …☆13Jul 31, 2021Updated 4 years ago
- Open Redirect scanner☆18May 20, 2022Updated 3 years ago
- BEST YOUTUBE VIDEO / PLAYLIST DOWNLOADER FOR WINDOWS☆10Oct 8, 2021Updated 4 years ago
- FastAPI framework, high performance, easy to learn, fast to code, ready for production☆11Mar 1, 2025Updated last year
- A Notion Changelog Next js boilerplate☆14Jun 28, 2021Updated 4 years ago
- Tool to get NT system shell .☆11Jun 29, 2021Updated 4 years ago
- BFSG - BruteForce String Generator 😾☆14May 11, 2023Updated 2 years ago