 # Ukraine-Cyber-Operations Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine. ([Blo…
☆29Mar 4, 2022Updated 4 years ago
Alternatives and similar repositories for bug-free-memory
Users that are interested in bug-free-memory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PHPMailer PHPMailer – A full-featured email creation and transfer class for PHP Test status codecov.io Latest Stable Version Total Downlo…☆27Mar 10, 2026Updated last month
- LulzSec FB Cracker ToolKit Bruter V0.1 tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTP…☆11Aug 14, 2017Updated 8 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 8 years ago
- # Cmder [](https://gitter.im/cmderdev/cmde…☆18Aug 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- cmslokomedia scanner tools☆14Dec 7, 2016Updated 9 years ago
- local b=game:GetService("Players")local c=game:GetService("ReplicatedStorage")local d=game:GetService("StarterGui")local e=game:GetServic…☆12Jan 27, 2022Updated 4 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆16Jan 25, 2026Updated 3 months ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Sirve para ver las peticiones entre el navegador y el servidor pero en el caso del internet gratis a través de vpn también los puede ayud…☆12Oct 1, 2021Updated 4 years ago
- Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with inten…☆25Aug 30, 2021Updated 4 years ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- ☆18Aug 5, 2022Updated 3 years ago
- Portofolio Tentang Kumpulan Remaja☆26Feb 29, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Ctrl+Shift+T for PowerShell Terminals☆12Sep 28, 2020Updated 5 years ago
- A multi-stream TCP relay over UDP. Fixes connecting to minecraft across the world.☆13Jan 16, 2022Updated 4 years ago
- A sample app that uses OKHTTP. Works with Proxyman app☆19Oct 24, 2025Updated 6 months ago
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- WhatsApp BoT☆31Oct 26, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Hacks a telegram account by string session..☆12Jan 4, 2022Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Web-based searchable archive for PocketMine-MP crash reports☆12Sep 24, 2025Updated 7 months ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- 📚 A Curated List of Awesome Telegram OSINT Tools, Sites & Resources☆13Feb 11, 2022Updated 4 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- AdAway is an open source ad blocker for Android using the hosts file.☆13Jun 14, 2014Updated 11 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- extract the number information usign termux, kali, ubantu and any linux distro☆40Jun 27, 2022Updated 3 years ago
- Tutorial Lengkap Cara internet Gratis Kartu Telkomsel Dengan termux opok tanpa pulsa dan kouta☆35Jul 31, 2021Updated 4 years ago
- A project demonstration on how to use the GigE camera to do the DeepStream Yolo3 object detection, how to set up the GigE camera, and dep…☆17Feb 11, 2022Updated 4 years ago