Collection of various malware techniques aimed at Windows through MinGW
☆16Aug 24, 2024Updated last year
Alternatives and similar repositories for Modules
Users that are interested in Modules are comparing it to the libraries listed below
Sorting:
- ☆23Feb 13, 2026Updated 2 weeks ago
- Starcraft 2 Real-time-with-pause☆27Dec 4, 2025Updated 2 months ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last week
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Within the deep web, there exists a page that hashes to: 36367763ab73783c7af284446c59466b4cd653239a311cb7116d4618dee09a8425893dc7500b464f…☆14Apr 14, 2021Updated 4 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- hatsApp Message Sender is a simple Python application that allows users to send WhatsApp messages programmatically using the pywhatkit li…☆14Nov 17, 2023Updated 2 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 5 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Windows Research Kernel☆37Sep 22, 2025Updated 5 months ago
- Open library of musculoskeletal models and examples ready to be used with the AnyBody Modelling System.☆30Feb 18, 2026Updated last week
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆86May 13, 2024Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- ☆79Nov 27, 2023Updated 2 years ago
- ☆53Apr 11, 2024Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆34Nov 29, 2025Updated 3 months ago
- Disarm — Fast AArch64 Decode/Encoder☆45Dec 21, 2024Updated last year
- ☆11Aug 25, 2018Updated 7 years ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- Explorama is a user-friendly data analytics tool designed specifically for subject matter experts and individuals without in-depth techni…☆12Feb 8, 2026Updated 2 weeks ago
- A dnSpyEx extension for DotNet Universal Patcher.☆12Nov 24, 2023Updated 2 years ago
- ⚡ FutureGPT - Application development framework that connects GPT-4 with external data, the internet, other applications and language mod…☆12May 14, 2023Updated 2 years ago
- Generate cross-platform sound intimations, push notifications and get a telegram message when a process execution is finished in the clou…☆16Feb 24, 2023Updated 3 years ago
- A simple subscribtion link provider for cloudflare workers in JS☆13Jul 29, 2025Updated 6 months ago
- ☆11Jan 22, 2021Updated 5 years ago
- A tool for monitoring the progress of data through a pipe.☆12Oct 31, 2025Updated 3 months ago
- This is a free and open source project for sending random messages (sms bomber)☆12Jun 6, 2024Updated last year
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- AGS Tool for translating games writen on Adventure Game Studio engine.☆12May 4, 2018Updated 7 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆11Oct 3, 2025Updated 4 months ago
- C64 playroutine identity scanner☆14Jan 9, 2026Updated last month
- In this tutorial we will introduce software defined radios (SDR) and explore the application of machine learning (ML) to radio frequency …☆10Sep 27, 2022Updated 3 years ago
- Deploy Backup and DR appliances☆12Jan 29, 2026Updated last month
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 7 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago