Builds a hosts file and an Unbound config for blocking advertising and malware domains.
☆10Jan 3, 2016Updated 10 years ago
Alternatives and similar repositories for ad-block-gen
Users that are interested in ad-block-gen are comparing it to the libraries listed below
Sorting:
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆16Sep 10, 2020Updated 5 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- HACK INSTAGAM ACCOUNTS USING BRUTEFORCE ATTACK ......☆39Apr 26, 2021Updated 4 years ago
- Back of the Envelope Thermal Analysis☆13Aug 6, 2021Updated 4 years ago
- Avoid timers throttling by browser when tab is inactive☆11May 28, 2017Updated 8 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆14Oct 30, 2022Updated 3 years ago
- Subtitle Download Service☆16Dec 7, 2022Updated 3 years ago
- Simple IRC Bot for flooding☆11Sep 12, 2011Updated 14 years ago
- Facebook hacking tool☆11Mar 3, 2023Updated 3 years ago
- Simple storage for stock prices with adjusted prices calculation based on Center for Research in Security Prices (CRSP) standards☆12Feb 15, 2018Updated 8 years ago
- Very simple Ruby on Rails photo gallery. This is a total rewrite of the original application, which most branches are based off of.☆88Jan 25, 2011Updated 15 years ago
- Simple tool to help bruteforce your Ethereum keystore passphrase☆10May 23, 2017Updated 8 years ago
- Podcast video downloader and converter☆16Feb 28, 2016Updated 10 years ago
- A library to encode and decode dns labels☆13Aug 9, 2023Updated 2 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A fprintd based fingerprint GUI for Linux☆10Sep 12, 2020Updated 5 years ago
- golang mysql escape string☆11Sep 2, 2016Updated 9 years ago
- ☆18Updated this week
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Basic collection of data mining algorithms implemented in Go☆10Jul 12, 2014Updated 11 years ago
- Hi-Link HLK-RM04☆13Dec 28, 2013Updated 12 years ago
- Export the NSX for vSphere Distributed Firewall to MS Excel☆13Nov 22, 2017Updated 8 years ago
- Hacking Books☆21Nov 25, 2019Updated 6 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 4 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Python package for astronomical machine learning and data science☆10Feb 16, 2026Updated 2 weeks ago
- Unofficial Segment.io Management node.js SDK☆11Oct 17, 2017Updated 8 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- PRT-10255☆13Jun 27, 2025Updated 8 months ago
- A Hardware MD5 Cracker for the Cyclone V SoC☆12Mar 25, 2015Updated 10 years ago
- Set your Slack status based on the SSID☆11Jun 29, 2017Updated 8 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Simple Quantar Dissector for Wireshark☆12Dec 6, 2017Updated 8 years ago
- Awesome Hacking and Tech. Related Tutorials☆11May 14, 2025Updated 9 months ago
- DOWNLOAD DROIDJACK CRACKED VERSION 4.4 FOR FREE.......☆42Sep 14, 2023Updated 2 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Get your podcasts from Sanity on the ether!☆12Dec 2, 2022Updated 3 years ago